Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(24 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Privacy Is Hard and Seven Other Myths ==
+
== ''Confidential Computing'' ==
  
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 
|-
 
|-
| '''TIME:'''&nbsp; Monday 9 May 2022, 14:00h<br />'''PLACE:'''&nbsp;  OsloMet Campus Pilestredet,<br /> Pilestredet 35, Building P35, Lecture hall PI447 (Entrance from Holbergs gate, use elevator next to the multi-floor indoor climbing wall in P35, turn right when exiting elevator. Closest stop for public transport: tram stop Holbergs plass.) . [https://kart.finn.no/?lng=10.73712&lat=59.92002&zoom=17&mapType=normap&markers=10.73712,59.92002,r,Pilestredet+Park+35 See map].<br />
+
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
Coffee and snaks served.<br />
+
All interested are welcome. Coffee and snaks served.<br />
 
<br />'''AGENDA:'''<br />
 
<br />'''AGENDA:'''<br />
14:00h Welcome at OsloMet and AF''Security''<br />14:15 Invited talk<br />
+
14:00h Welcome to AFSecurity at UiO <br />
* TITLE: ''Privacy Is Hard and Seven Other Myths'' &nbsp;
+
14:15h Invited talk<br />
* SPEAKER: Jaap-Henk Hoepman, Radboud University Nijmegen, The Netherlands
+
* TITLE: ''Confidential Computing'' &nbsp;
| <center>[[File:Photo-Jaap-Henk-Hoepman-head.jpg|150px|link=https://www.cs.ru.nl/~jhh/]]</center>
+
* SPEAKER: Ijlal Loutfi, Canonical 
| <center>[[File:logo-Radboud-University.jpg|200px|link=http://www.ru.nl//]]</center>
+
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 
|}
 
|}
* ABSTRACT:<br />In this talk Jaap-Henk Hoepman discusses some of the myths surrounding privacy (like ''"I have nothing to hide"'' and ''"We are not collecting personal data"'' or ''"You have zero privacy anyway. Get over it."''). All to show that technological developments have had a tremendous impact on our privacy, but also can be used to protect our privacy. He will talk about the legal protection of privacy through the General Data Protection Regulation (GDPR), and discuss how relying on purely legal measures is not enough. The systems themselves should be designed in a privacy friendly manner, through privacy by design. He will explain the privacy by design philosophy, and make it concrete by describing eight privacy design strategies.<br />
+
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
15:00h Disussion.<br />
 
  
'''BIO:'''&nbsp; [https://www.cs.ru.nl/~jhh/ Jaap-Henk Hoepman] is Associate Professor of privacy enhancing protocols and privacy by design in the [http://www.cs.ru.nl/sos/ Digital Security Group] at the [http://www.cs.ru.nl/ Institute for Computing and Information Sciences] of the [http://www.ru.nl/ Radboud University Nijmegen], principal scientist of the [http://www.pilab.nl/ Privacy and Identity Lab], and member of [https://ihub.ru.nl/ iHub], Radboud University’s interdisciplinary research hub on Digitalization and Society. He is also Adjunct Professor at [https://kau.se/ Karlstad University] and member of [https://www.kau.se/en/cs/research/research-areas/privacy-and-security-prisec/prisec-privacy-and-security PRISEC] (Privacy And Security Group). Moreover he is Associate Professor in the IT Law section of the [https://www.rug.nl/rechten/organization/vakgroepen/transboundary-legal-studies/ Transboundary Legal Studies Department] of the [http://www.rug.nl/rechten/ Faculty of Law] of the [https://www.rug.nl/ University of Groningen].
+
<br />15:00h Discussion<br />
  
The [https://www.cs.ru.nl/~jhh/research.html main research interests] of Prof. Hoepman are privacy by design and privacy friendly protocols for identity management and the Internet of Things.
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
Prof. Hoepman's book [https://mitpress.mit.edu/books/privacy-hard-and-seven-other-myths 'Privacy Is Hard and Seven Other Myths. Achieving Privacy through Careful Design'] appeared at MIT Press in 2021. The book explains to the general public how technology can be used to protect privacy.
+
 
 
<br /><br />
 
<br /><br />
  
Line 25: Line 25:
 
|-
 
|-
 
| [[File:AFSecurity-small.png|250px]]
 
| [[File:AFSecurity-small.png|250px]]
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/english/research/groups/sec/ Digital Security]
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
 
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
| [[File:logo-OsloMet.png|150px|link=https://www.mn.oslomet.no/]]
 
 
|}
 
|}

Latest revision as of 14:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png