Difference between revisions of "AFSecurity Seminar"

From mn/ifi/AFSecurity
Jump to: navigation, search
 
(340 intermediate revisions by the same user not shown)
Line 1: Line 1:
== ''India's Unique Identity Project'' ==
+
== ''Confidential Computing'' ==
  
Date:  8 May 2015.
+
{| border="0" cellpadding="1" cellspacing="1" width="100%"
 +
|-
 +
| '''TIME:'''&nbsp; Friday 1 December 2023, 14:00h<br />'''PLACE:'''&nbsp;  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. [https://kart.finn.no/?lng=10.71782&lat=59.94342&zoom=17&mapType=normap&markers=10.71782,59.94342,r,Gaustadall%C3%A9en+23B See map].<br />
 +
All interested are welcome. Coffee and snaks served.<br />
 +
<br />'''AGENDA:'''<br />
 +
14:00h Welcome to AFSecurity at UiO <br />
 +
14:15h Invited talk<br />
 +
* TITLE: ''Confidential Computing'' &nbsp;
 +
* SPEAKER: Ijlal Loutfi, Canonical 
 +
| <center>[[File:photo-Ijlal-Loutfi.png|90px|link=https://www.linkedin.com/in/ijlal-loutfi-785125234/]]</center>
 +
| <center>[[File:logo-Canonical.png|320px|link=https://canonical.com/]]</center>
 +
|}
 +
* ABSTRACT:<br />Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.<br /><br />Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.<br /><br />In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.
  
Location:&nbsp; Ole-Johan Dahls hus (IFI).
+
<br />15:00h Discussion<br />
  
'''Agenda'''
+
'''BIO:''' &nbsp; Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.
  
15:00h Welcome at IFI
+
 
 +
<br /><br />
  
'''SPEAKER:''' Dhiren Patel (NIT Surat, India).
+
{| border="0" cellpadding="1" cellspacing="1" width="90%"
 
+
|-
'''TITLE:''' ''Large Scale Biometric Identity Management System: India’s UID Project – an Overview''
+
| [[File:AFSecurity-small.png|250px]]
 
+
| AF''Security'' is organised by UiO [https://www.mn.uio.no/ifi/forskning/grupper/sec/ Digital Security].
'''ABSTRACT:'''
+
| [[File:logo-uio-english-2022.png|250px|link=https://www.mn.uio.no/]]
As India moves towards large scale e-Governance adoption, a soft infrastructure for Government service delivery is needed to ensure efficiency and accountability across multiple systems. A national ID system is crucial to improve the efficiency and transparency of various e-Governance initiatives. The UID (Unique Identity) project of India has the vision of empowering every resident of India with a unique identity and providing a digital platform to authenticate anytime anywhere. Using biometrics, it provides an instant, electronic, non-repudiable proof of identity. This system is built on a sound strategy and a strong technology backbone and has evolved into a vital digital infrastructure.
+
| [[File:Sec-light-360.png|150px|link=https://www.mn.uio.no/ifi/english/research/groups/sec/]]
This lecture encompasses discussion on Large Scale Identity Management Systems with a detailed case study of India’s UID Project.  
+
|}
 
 
'''SPEAKER BIO:'''
 
Dr. Dhiren Patel is a Professor & Chair of Computer Engineering Department at NIT Surat, India. He leads Security and Cloud computing group at NIT Surat. Prof. Patel has academic and research associations with University of Denver, Colorado – USA (Visiting Professor – Summer and Fall 2014), IIT Gandhinagar - India (Visiting Professor – 2009-2011), with City University London (Visiting Scientist – Cyber Security – 2009-2014), with British Telecom UK (Visiting Researcher – Cloud Security and Trust Management - 2012), and with C-DAC Mumbai - India (Research Advisor – Security and Critical Infrastructure Protection). He has authored a book on Information Security (ISBN-978-81-203-3351-2, Prentice Hall 2008) and numerous research papers. He is associated with many high power government committees in India on Higher Technical Education and Security Research.
 

Latest revision as of 14:30, 14 November 2023

Confidential Computing

TIME:  Friday 1 December 2023, 14:00h
PLACE:  Auditorium Smalltalk, 1st floor, IFI, UiO, Ole Johan Dahls hus, Gaustadalleen 23b, Oslo. See map.

All interested are welcome. Coffee and snaks served.

AGENDA:
14:00h Welcome to AFSecurity at UiO
14:15h Invited talk

  • TITLE: Confidential Computing  
  • SPEAKER: Ijlal Loutfi, Canonical
Photo-Ijlal-Loutfi.png
Logo-Canonical.png
  • ABSTRACT:
    Protecting data in-use has long been a challenging open problem in computer science. While being computed on in cleartext in system memory, your data stored in RAM is exposed to the millions lines of code that make up the underlying platform’s privileged system software. By design, a malicious firmware, or compromised operating system can easily leak your data, or compromise its integrity.

    Confidential computing is a privacy-enhancing system security primitive which addresses this challenge head-on, by running your security-sensitive processes in isolated execution environments whose security guarantees can be remotely attested. Its recent generations, such as Intel SGX, Intel TDX and AMD SEV SNP, make use of newer CPU hardware and architectural extensions, such as the AES-128 hardware encryption engine which encrypts RAM memory pages in real-time. Hardware with these capabilities is already available in the market, and public cloud providers have been one of its early adopters.

    In this presentation, we first visit the history of confidential computing, then study the technical system primitives which allow us to implement both isolation and attestation. We also explore the different silicon implementations of confidential computing, where they are deployed today, and for which uses cases.


15:00h Discussion

BIO:   Dr. Ijlal Loutfi is the product lead for Ubuntu Security at Canonical. She has a PhD in cyber security from the University of Oslo, where she worked on Trusted Execution Environments and Identity Management.




AFSecurity-small.png AFSecurity is organised by UiO Digital Security. Logo-uio-english-2022.png Sec-light-360.png