Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(105 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Cyber Security in High School ==
+
== ''Confidential Computing'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''DATE:'''&nbsp; 21 February 2019<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
'''PLACE:'''&nbsp;  Seminar Room Prolog (Room 2465), IFI - OJD House . <br /><br />
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''<br />
+
<br />'''AGENDA:'''<br />
15:00h Welcom at IFI<br /><br />15:15h Invited Talks:
+
14:00h Welcome to AFSecurity at UiO <br />
| [[File:Logo-GenCyber.jpg|300px|link=https://gencyber.utulsa.edu/]]  
+
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* '''TITLE:''' &nbsp;''Cyber Security in High School: The US GenCyber Program and the Norwegian CyberSmart Pilot for Cyber Security Education in High School.''<br/><br />'''SPEAKERS:''' &nbsp;''Kimberly Adams'' and ''Donna Farrior'' (GenCyber USA), ''Bodil Gr&oslash;dem'' and ''Janne Hagen'' (CyberSmart Norway) &nbsp; <br/><br />'''ABSTRACT:''' This AF''Security'' Seminar presents the US GenCyber and the Norwegian CyberSmart Programs for cyber-security education in high school.<br /><br /> The US GenCyber Program is an NSA-funded one-week intensive summer program for a cohort of 30 teachers in high school, followed by a sustained collaboration which takes place via an online community and resource repository for use during the following academic year and beyond. The GenCyber program at the University of Tulsa focuses on preparing teachers in high school to help their students understand correct and safe on-line behavior, to increase diversity and interest in cyber security, and to increase awareness about careers in the cyber-security workforce in USA.<br /><br />The Norwegian CyberSmart Pilot Program is a collaboration between NSM, NVE, UIO, NTNU, NorSis and Godalen vgs, Rogaland Fylkeskommune. The CyberSmart pilot project, which has been operating since 2018 with funding from NVE, gives knowledge and skills to teachers in high school in Norway, so that they can integrate cybersecurity in their classes in high school. The CyberSmart pilot project aims to fulfill one of the major goals of the Norwegian Government's [https://www.regjeringen.no/no/dokumenter/nasjonal-strategi-for-digital-sikkerhet/id2627177/ National Strategy for Digital Security] published on 30.01.2019, namely to make cyber security a component of general education in Norway.
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
 +
<br />15:00h Discussion<br />
  
16:00h Discussion<br />
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
 +
 
 +
<br /><br />
  
'''SPEAKER BIOS''' <br/>
 
- Kimbery Adams is a Senior Instructor of Mathematics at the
 
College of Engineering & Natural Sciences, Department of Mathematics .<br />- Donna Farrior is a Visiting Associate Professor of Mathematics at the
 
College of Engineering & Natural Sciences, Department of Mathematics. <br />- Bodil Ellen Gr&oslash;dem is Project Manager for CyberSmart Norway. <br />- Janne Hagen is Chief Engineer for Cyber Security at NVE.
 
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
| AF''Security'' is organised by the [https://www.mn.uio.no/ifi/english/research/groups/sec/ Information &amp; Cyber Security Research Group]
+
| [[File:AFSecurity-small.png|250px]]
| [[File:Sec-uio-light-1000.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 +
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png