Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(343 intermediate revisions by the same user not shown)
Line 1: Line 1:
== ''Cryptography for People'' ==
+
== ''Confidential Computing'' ==
  
Date: Tuesday 14 April 2015.
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 +
|-
 +
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 +
All interested are welcome. Coffee and snaks served.<br />
 +
<br />'''AGENDA:'''<br />
 +
14:00h Welcome to AFSecurity at UiO <br />
 +
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 +
|}
 +
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
Location: Kristen Nygaards sal (room 5370), Ole-Johan Dahls hus (IFI).
+
<br />15:00h Discussion<br />
  
'''Agenda'''
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
10:00h Welcome at IFI
+
 
 +
<br /><br />
  
10:15h Invited talk
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
+
|-
11:00h Discussion
+
| [[File:AFSecurity-small.png|250px]]
 
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
'''SPEAKER:''' Jan Camenisch (IBM Research Zurich)
+
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
 
+
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
'''TITLE:''' ''Cryptography for People''
+
|}
 
 
'''ABSTRACT:''' As our lives become increasingly digital, we all need to protect and manage our personal digital assets including family pictures, health information, contact data, calendar entries, and digital identity information. We store and use these information at different places using different devices.
 
 
 
In this talk we review the state of the art in cryptography in terms of how it can help us to protect and manage our data on different devices and in the cloud. We will discuss what features the different cryptographic mechanisms provide and to what extend they can be used in practice or how far out they are.
 
 
 
Url: [http://researcher.watson.ibm.com/researcher/view.php?person=zurich-JCA http://researcher.watson.ibm.com/researcher/view.php?person=zurich-JCA]
 
 
 
<br/>'''SPEAKER BIO:''' Dr. Jan Camenisch is a Principal Research Staff Member at IBM Research - Zurich and leads the Privacy & Cryptography research team. He's a member of the IBM Academy of Technology and an IEEE Fellow.
 
 
 
He is a leading scientist in the area of privacy and cryptography, has published over 100 widely cited papers, and has received a number of awards for his work, including the 2010 ACM SIGSAC outstanding innovation award and the 2013 IEEE computer society technical achievement award.
 
 
 
Jan is also a co-inventor of Identity Mixer, a unique cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes.
 
 
 
Jan was leading the FP7 European research consortia PRIME and PrimeLife, and he and his team have and continue to participate in many other projects including ABC4Trust, AU2EU, and Witdom. Jan currently holds an advanced ERC grant.
 
 
 
"By inventing and using cryptography, I try to regain the fading privacy of our increasingly electronic society. See my publications for the crypto mechanisms and see the PrimeLife project for how to use them."
 

Latest revision as of 15:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png