Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(85 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Privacy Threat of Keystroke Profiling on the Web ==
+
== ''Confidential Computing'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''DATE:'''&nbsp; 30 August 2019<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
'''PLACE:'''&nbsp;  Kristan Nygaards Hall (Room 5370), IFI, UiO - OJD House . <br /><br />
+
All interested are welcome. Coffee and snaks served.<br />
'''AGENDA:'''<br />
+
<br />'''AGENDA:'''<br />
14:00h Welcom at UiO<br /><br />14:15h Invited Talk:
+
14:00h Welcome to AFSecurity at UiO <br />
| [[File:logo-ENSICAEN.png|300px|link=https://ccdcoe.org/]]
+
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* '''TALK:''' &nbsp;''Privacy Threat of Keystroke Profiling on the Web''<br />'''SPEAKER:''' ''Denis Migdal'' (ENSICAEN) &nbsp; <br />'''ABSTRACT:''' In a browser environment, Keystroke Dynamics (the way of typing on a keyboard) is an interesting biometric modality as it requires neither additional sensors (just your keyboard), nor additional actions from the user.  Keystroke Dynamics can easily be collected through a Web page to authenticate,  identify, or profile visitors...  even without their knowledge and consent. Contrary  to  learning-based  Keystroke  Dynamics  (s.a.  based  on Deep  learning  or SVM), distance-based Keystroke Dynamics can be used with very few data. However, it generally provides deceiving authentication and identification performances.  In a first part, we will see how to improve such performances, and how Keystroke Dynamics can pose serious threats to users privacy, even with only few information. Fortunately, thanks to Keystroke Dynamics Anonymization Systems, it is possible to protect our Keystroke Dynamics, or at last to disturb identification and profiling systems. Several  Keystroke  Dynamics  Anonymization  Systems  will  be  presented  in  the  second part, as well  as  some  recommendations  to  build  and  implement  Keystroke  Dynamics Anonymization Systems. In a third part, I will present a multi-modal privacy-compliant authentication based, among other, on Keystroke Dynamics, as well as some schemes and uses cases. Proof of authorship in an online collaborative document writing, or proof of identity on a Social Network constitute application of our proposed authentication. And if we still have time, the fourth part will be dedicated to synthetic generation of Keystroke Dynamics. Usurpation of Keystroke Dynamics, Keystroke Dynamics dataset creation or augmentation, and better understanding of Keystroke Dynamics are goals of Keystroke Dynamics synthetic generation
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
16:00h Discussion<br />
 
  
 +
<br />15:00h Discussion<br />
 +
 +
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
 +
 +
 
 +
<br /><br />
  
'''SPEAKER BIO''' <br/>
 
Denis Migdal is PhD student at ENSICAEN in Caen, France. His PhD research project focuses on privacy protection against user profiling which can exploit biometric keystroke dynamics of normal user activity on the Web.
 
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by the UiO Research Group on [https://www.mn.uio.no/ifi/english/research/groups/sec/ Information &amp; Cyber Security]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
| [[File:Sec-uio-light-1000.png|250px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
+
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 +
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
|}
 
|}

Latest revision as of 14:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png