Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(177 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Cybersecurity Challenges ==
+
== ''Confidential Computing'' ==
  
'''DATE:'''  Monday 4 December 2017
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
+
|-
'''LOCATION:'''  Seminar room Python (room 2269), Ole Johan Dahl's House.
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp; Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''
+
<br />'''AGENDA:'''<br />
 
+
14:00h Welcome to AFSecurity at UiO <br />
14:00h Welcome at IFI
+
14:15h Invited talk<br />
 
+
* TITLE: ''Confidential Computing'' &nbsp;
14:15h Invited Talks:
+
* SPEAKER: Ijlal Loutfi, Canonical 
 
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
* '''The Usual Insecurity of Things''',&nbsp; ''Keith Martin'',&nbsp; Royal Holloway College, University of London <br/> While the Internet of Things is used to describe a host of new lightweight technologies, when it comes to security it pays to focus less on the novelty of IoT, and more on what IoT applications have in common with previous technologies that have learned about security the hard way (by first getting it wrong). It's time to go back to basics, and reflect on what security means in cyberspace. Only once this is understood, can we hope to secure any type of application that resides there.
+
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
* '''System-wide Probabilistic Vulnerability Assessment Using Attack Graphs''',&nbsp; ''Mathias Eckstedt'',&nbsp; Royal Institute of Technology (KTH), Stockholm<br />T-systems are today highly complex and interconnected into large systems-of-systems. With the ongoing digitalization systems are becoming even more all encompassing and integrated. Ensuring a high-level of security in such system environments is a challenge that thus requires a holistic approach addressing multiple and a diverse set of attack surfaces and potential attack vectors. This presentation describes previous and ongoing work with combining probabilistic attack graphs and system architecture modelling as a means to produce design and maintenance support for security engineering of system architectures.
+
|}
* '''Cybersecurity in the Norwegian Energy Sector''',&nbsp; ''Janne Hagen'',&nbsp; The Norwegian Water Resources and Energy Directorate (NVE)
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
* Title T.B.A.,&nbsp; ''Tord Persokrud'',&nbsp; Conax
 
* '''Defending Critical Infrastructure from Espionage and Sabotage''',&nbsp; ''Frode Hommedal'',&nbsp; Telenor SOC and CERT
 
  
16:00h Panel and Discussion
+
<br />15:00h Discussion<br />
  
 +
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
'''SPEAKER BIOS:'''
+
 
* '''Keith Martin''' (Bio TBA)
+
<br /><br />
* '''Mathias Ekstedt''' is Professor in Industrial Information and Control Systems at KTH Royal Institute of Technology, Sweden. His research interests include software, systems, and enterprise architecture modeling and analyses with respect to information and cyber security. In particular the research is applied in the power industry and information systems related to physical monitoring and control. He is currently engaged in the EU FP7 project SEGRID (security for smart electricity grids) and the nationally funded Resilient Information and Control Systems (RICS) center. He is also co-founder of foreseeti, a start-up company developing a tool for cyber security modeling and analysis.
 
* '''Janne Hagen''' (Bio T.B.A.)
 
* '''Tord Persokrud''' (Bio T.B.A.)
 
* '''Frode Hommedal''' is a senior incident responder and analyst. He is currently head of incident response and security analytics at Telenor CERT, where he’s part of the team that is establishing the global CERT/SOC capability of Telenor, Norway’s biggest telco, with over 200 million customers and presence in South-East Asia, Easter Europe and the Nordics. He has previously worked seven years for the Norwegian national CSIRT, NorCERT, mostly with targeted intrusions. One of Frode’s main interests is modelling CSIRTs to improve performance.
 
  
{| border="0" cellpadding="1" cellspacing="1" width="100%"
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 14:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png