Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(186 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Computational Trust ==
+
== ''Confidential Computing'' ==
  
'''DATE:'''  Monday 13 November 2017
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 +
|-
 +
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 +
All interested are welcome. Coffee and snaks served.<br />
 +
<br />'''AGENDA:'''<br />
 +
14:00h Welcome to AFSecurity at UiO <br />
 +
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 +
|}
 +
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
'''LOCATION:'''&nbsp; Kristen Nygaards sal (room 5370), Ole Johan Dahl's House.
+
<br />15:00h Discussion<br />
  
'''AGENDA:'''
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
14:00h Welcome at IFI
+
 
 +
<br /><br />
  
14:15h Talk: ''Computational Trust: Principles for Mathematical Representation and Analysis of Trust''
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
 
15:00h Discussion
 
 
 
 
 
'''SPEAKER:''' Mirko Tagliaferri (University of Urbino, Italy)
 
 
 
'''ABSTRACT:'''
 
There are numerous models that attempt to give a clear and precise formalisation of the notion
 
of trust. Ranging from cognitive models (where the mental states of trusting agents are the
 
base for trust values) to game-theoretic models (where trust depends on subjective
 
probabilities attributed to events), the literature on computational trust is a huge jungle of
 
different approaches and different representations of the notion of trust. Each one of those
 
representations bear peculiar features that allows an application of the concept of trust to
 
specific scenarios. Nonetheless, the literature suffers from a lack of cohesion both from a
 
linguistic (different words for the same concepts) and from a theoretical point-of-view. My talk
 
will focus on those issues, with an emphasis on the latter. The aim is to pin the core features
 
of computational trust down, to obtain some necessary conditions each mathematical model
 
ought to fulfil in order to qualify as a model of computational trust. Doing so will also give me
 
the chance to clarify the terms involved, abstracting away from subtleties related to specific
 
applications. The contribution of this talk is, therefore, two-fold: it provides a guide for
 
newcomers to the subject, who will benefit from a linguistic clarification of the technical
 
language of the subject, and it provides a solid starting point for all who wish to pursue
 
research on computation trust.
 
 
 
'''SPEAKER BIO:'''
 
Mirko Tagliaferri is currently a Ph.D. student in Complexity Science at the University of Urbino in Italy. After
 
obtaining his Bachelor in philosophy in 2014 at the same university, with a thesis that focused on automatic inductive reasoning, he spent one year in Scotland, at the University of Glasgow, obtaining a Master Degree in analytical philosophy. His main research interests are formal models of complex systems and logical representations of epistemic notions. Under the supervision of Prof. Alessandro Aldini, he decided to focus his research on computational trust, trying to design new algebraic models for the notion that can improve our understanding of how trust can be employed in computational environments.
 
 
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png