Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(388 intermediate revisions by the same user not shown)
Line 1: Line 1:
== ''Cybersecurity 2020'' ==
+
== ''Confidential Computing'' ==
  
Date: 5 September 2014.
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 +
|-
 +
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 +
All interested are welcome. Coffee and snaks served.<br />
 +
<br />'''AGENDA:'''<br />
 +
14:00h Welcome to AFSecurity at UiO <br />
 +
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 +
|}
 +
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
Location: Meeting room Awk (room 3118), Ole-Johan Dahls hus (IfI).
+
<br />15:00h Discussion<br />
  
'''Agenda'''
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
10:00h Welcome at IfI
+
 
 +
<br /><br />
  
10:15h Invited talk
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
+
|-
'''SPEAKER:''' Dr. Daniel "Rags" Ragsdale (DARPA)
+
| [[File:AFSecurity-small.png|250px]]
 
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
'''TITLE:''' ''Cybersecurity 2020''
+
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
+
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
'''ABSTRACT&nbsp;: ''' T.B.A.
+
|}
 
 
'''SPEAKER BIO: ''' Dr. Daniel "Rags" Ragsdale joined DARPA as a Program Manager in June 2011. His research interests include computer network operations, cyber deception, cyber security education and training, computer ethics and privacy, and network sciences. Before joining DARPA, Dr. Ragsdale served for more than a decade at the United States Military Academy at West Point where he held a variety of supervisory roles, culminating with his service as Vice Dean for Education. In this capacity, Dr. Ragsdale was the Strategic Planner and Principal Deputy to West Point's Chief Academic Officer.
 
 
 
A recently retired U.S. Army colonel, Dr. Ragsdale's operational assignments included combat deployments in support of Operations Urgent Fury (Grenada), Enduring Freedom (Afghanistan), and Iraqi Freedom (Iraq). In his most recent deployment, Dr. Ragsdale served as the Deputy Commander of a 2000-person Task Force responsible for the security and defense of the largest coalition based in Iraq.
 
 
 
Dr. Ragsdale has more than 20 years of supervisory experience in research and development (R&D) and educational settings. His focus on the technical as well as the human dimension of cyber security helped him to bring about innovation in the laboratory, in the classroom, and in operational settings. He has authored or co-authored dozens of cyber security papers, articles, and book chapters.
 
 
 
Dr. Ragsdale holds a Doctor of Philosophy in Computer Science from Texas A&M University, a Master of Science in Computer Science from the Naval Postgraduate School, and a Bachelor of Science from the United States Military Academy.
 
 
 
<br/>11:00h Discussion
 

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png