Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(168 intermediate revisions by the same user not shown)
Line 1: Line 1:
== AF''Security'' Seminar ==
+
== ''Confidential Computing'' ==
== Cybersecurity Research Topics ==
 
  
'''DATE:'''  Tuesday 27 February 2018
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
+
|-
'''LOCATION:'''   Kristen Nygaard's Hall (Room 5370), IFI - OJD House.  
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''
+
<br />'''AGENDA:'''<br />
 
+
14:00h Welcome to AFSecurity at UiO <br />
14:00h Welcome at IFI
+
14:15h Invited talk<br />
 
+
* TITLE: ''Confidential Computing'' &nbsp;
14:15h Invited Talks:
+
* SPEAKER: Ijlal Loutfi, Canonical 
 
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
* '''Neural models of reputation''',&nbsp; ''Pierre Lison'',&nbsp; ''Norwegian Computing Center.''<br/> This talk present ongoing research on developing data-driven, predictive models of entity reputation (in the sense of being benign or malicious) for end-point hosts. The talk explains the approach used for learning deep neural networks to automatically predict the reputation of domain names or IP addresses from features extracted from passive DNS data. Furthermore, the talk shows how recurrent neural networks can be employed to detect the presence of malware-generated domain names.
+
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
* '''Intrusion Detection with Neural Networks''',&nbsp; ''Carlos García Cordero'',&nbsp; ''Technical University Darmstadt, Germany.''<br />This talk describes research on flow-based anomaly intrusion detection using replicator neural networks.
+
|}
* '''Safety of Cyber-Physical Systems''',&nbsp; ''Ulrich Fahrenberg'',&nbsp; ''Ecole Polytecnique, Paris, France.''<br />Abstract T.B.A.
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
* '''CA Authorization: Solving a Problem or Moving it Somewhere Else?''',&nbsp; ''Nils Gruschka'',&nbsp; ''University of Oslo.''<br />Abstract T.B.A.  
 
  
16:00h Panel and Discussion<br />
+
<br />15:00h Discussion<br />
Chair: ''Audun Jøsang''
 
  
 +
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
'''SPEAKER BIOS:'''
+
 
* '''Pierre Lison'''  is a senior research scientist at the Norwegian Computing Center in Oslo, where he is involved in several research projects related to language technology and machine learning.  He studied computer science and computational linguistics at the universities of Louvain (Belgium) and Saarland (Germany), and completed his PhD in 2014 at the University of Oslo..
+
<br /><br />
* '''Carlos García Cordero''' is a scientist, systems engineer, mathematician, musician and thinker. Carlos' research experience and interests are wide and cover diverse topics such as cyber-security, artificial intelligence, programming languages, compilers, machine learning and computer graphics, among others. Carlos is currently studying a PhD in Cyber Security and Distributed Machine Learning at TU Darmstadt. He has an MSc in Artificial Intelligence from The University of Edinburgh and a BSc in Computer Systems Engineering from the ITESM CSF in Mexico, both achieved with the highest honors.
 
* '''Ulrich Fahrenberg''' works at École Polytechnique in Paris, France. 
 
* '''Nils Gruschka''' is Associate Prof. at the University of Oslo.
 
  
{| border="0" cellpadding="1" cellspacing="1" width="100%"
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
| AFSecurity is organised by the University of Oslo [http://www.mn.uio.no/ifi/english/research/networks/securitylab/ SecurityLab]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Logo-UiO-SecurityLab-colour.jpg|200px]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png