Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(164 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Cybersecurity Research Topics ==
+
== ''Confidential Computing'' ==
  
'''DATE:'''  Tuesday 27 February 2018
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
+
|-
'''LOCATION:'''   Kristen Nygaard's Hall (Room 5370), IFI - OJD House.  
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''
+
<br />'''AGENDA:'''<br />
 
+
14:00h Welcome to AFSecurity at UiO <br />
14:00h Welcome at IFI
+
14:15h Invited talk<br />
 
+
* TITLE: ''Confidential Computing'' &nbsp;
14:10h Invited Talks:
+
* SPEAKER: Ijlal Loutfi, Canonical 
 
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
* '''Neural Models of Reputation''',&nbsp; ''Pierre Lison'',&nbsp; ''Norwegian Computing Center.''<br/> This talk present ongoing research on developing data-driven, predictive models of entity reputation (in the sense that it can be considered benign or malicious) for end-point hosts. The talk explains the approach used for learning deep neural networks to automatically predict the reputation of domain names or IP addresses from features extracted from passive DNS data. Furthermore, the talk shows how recurrent neural networks can be employed to detect the presence of malware-generated domain names.
+
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
* '''Intrusion Detection with Neural Networks''',&nbsp; ''Carlos García Cordero'',&nbsp; ''Technical University Darmstadt, Germany.''<br />This talk describes research on flow-based anomaly intrusion detection using replicator neural networks.
+
|}
* '''Safety of Cyber-Physical Systems''',&nbsp; ''Ulrich Fahrenberg'',&nbsp; ''École Polytecnique, Paris, France.''<br />Modeling and simulation are essential for ensuring the safety and correct functioning of cyber-physical systems (CPS) and are customarily used in industry. However, running simulations is insufficient to assure functionality.  Formal verification offers itself as an alternative, but has not seen wide-spread adoption.  I will give an overview of the state of the art of CPS verification and point out several venues along which there have been recent promising advances.
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
* '''CA Authorization: Fixing a Problem or Shifting it Elsewhere?''',&nbsp; ''Nils Gruschka'',&nbsp; ''University of Oslo.''<br />Due to increased security awarenes Web sites are increasingly switching to HTTPS. In addition to the TLS protocol, certificates and the Web PKI are essential. However, numerous incidents of fake certificates have shattered the trust in the current Web PKI system. This talk explains the latest efforts for strengthening certificate security and discusses challenges for the future.
 
  
16:00h Discussion<br />
+
<br />15:00h Discussion<br />
Chair: ''Audun Jøsang''
 
  
 +
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
'''SPEAKER BIOS:'''
+
 
* '''Pierre Lison'''  is a senior research scientist at the Norwegian Computing Center in Oslo, where he is involved in several research projects related to language technology and machine learning.  He studied computer science and computational linguistics at the universities of Louvain (Belgium) and Saarland (Germany), and completed his PhD in 2014 at the University of Oslo..
+
<br /><br />
* '''Carlos García Cordero''' is a scientist, systems engineer, mathematician, musician and thinker. Carlos' research experience and interests are wide and cover diverse topics such as cyber-security, artificial intelligence, programming languages, compilers, machine learning and computer graphics, among others. Carlos is currently studying a PhD in Cyber Security and Distributed Machine Learning at TU Darmstadt. He has an MSc in Artificial Intelligence from The University of Edinburgh and a BSc in Computer Systems Engineering from the ITESM CSF in Mexico, both achieved with the highest honors.
 
* '''Ulrich (Uli) Fahrenberg''' holds a PhD in mathematics from Aalborg University, Denmark. He has started his career in computer science as an assistant professor at Aalborg University. Afterwards he has worked as a postdoc at Inria Rennes, France, and since 2016 he is a researcher at the computer science lab at École polytechnique in Palaiseau, France. Fahrenberg has worked in algebraic topology, concurrency theory, real-time verification, and general quantitative verification. He has published more than 60 papers in computer science and mathematics. 
 
* '''Nils Gruschka''' studied computer science at the University of Kiel, Germany, and received his PhD degree in 2008. He was a senior researcher at NEC Laboratories Europe in Heidelberg, Germany. In 2012, he became a professor at Kiel University of Applied Sciences, Germany. Since 2018 he is an associate professor at the University of Oslo, Norway.
 
  
{| border="0" cellpadding="1" cellspacing="1" width="100%"
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png