Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(133 intermediate revisions by the same user not shown)
Line 1: Line 1:
== TSD: Services for Sensitive Data ==
+
== ''Confidential Computing'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''DATE:'''&nbsp; 22 November 2018<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
'''LOCATION:'''&nbsp;  Kristan Nygaards Hall (Room 5370), IFI - OJD House. <br /><br />
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''<br />
+
<br />'''AGENDA:'''<br />
15:00h Welcome at IFI<br />15:15h Invited Talk:
+
14:00h Welcome to AFSecurity at UiO <br />
| [[File:Logo-TSD.jpg|100px]]
+
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* '''TITLE:''' &nbsp;''TSD: UiO's Services for Sensitive Data - From an IT-Security Perspective.''<br/>'''SPEAKER:''' &nbsp;''Gard Thomassen''&nbsp; <br/>'''ABSTRACT:''' <br /> This talk describes how TSD at UiO fills the eInfrastructure needs of researchers who are collecting, generating, analysing, sharing and storing (often large amounts of) sensitive data. Since 2012 USIT (UiO's IT Department ) along with UiO researchers have invested considerable time, money and effort to build and improve TSD to provide services that are useful, secure and flexible. TSD (Tjeneste for Sensitive Data) translates into “Services for Sensitive Data”. <br/><br/>TSD currently hosts >2 PiB of data from >530 research projects with > 2500 researchers. TSD also hosts a small HPC cluster and a means of collecting data through online questionnaires or from smart-phone apps. This talk will explain how USIT handles the fast and continuing development of the TSD research eInfrastructure in a sustainable way with focus on delivering flexible services for research and clinical analysis while still complying with very strict security regulations. <br/><br/>Further, a few of the most significant features and smartphone applications connected to TSD will be discussed and demonstrated, and finally a glimpse into the future of TSD will be given.
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
 +
<br />15:00h Discussion<br />
  
16:00h Discussion<br />
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
 +
 
 +
<br /><br />
  
'''SPEAKER BIO''' <br/>
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
Gard Thomassen holds a PhD in Bioinformatics, and participated in the first exome and transcriptome sequencing of tumor/normal samples in Norway in 2010. In 2012 Thomassen became project leader for building a system for storage, analysis and collection of sensitive data (TSD) at the University of Oslo Centre for IT (USIT). TSD is now a national eInfrastructure for research on sensitive data. TSD also delivers IT infrastructure for clinical deep sequencing at the Oslo University Hospital. Today, Thomassen is the Head of the Division for Research Computing and Assistant Director at the USIT at the University of Oslo, Norway.
 
 
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png