Sign up or log in to bookmark your favorites and sync them to your phone or calendar.
Welcome & Opening Remarks - Elena Reshetova, Int...
Deep Analysis of Exploitable Linux Kernel Vulner... 09:05 - 09:50
Exploiting Race Conditions Using the Scheduler -... 09:50 - 10:35
Dealing with Uninitialized Memor... 10:55 - 11:25
A New Proposal for Protecting Ke... 11:25 - 11:55
Tracing: The Bane of You Security Folks - Steven... 11:55 - 12:40
Kernel Runtime Security Instrumentation - KP Sin... 13:50 - 14:35
CRIU and SELinux - Adrian Reber,... 14:35 - 15:05
Address Spaces for Namespaces -... 15:05 - 15:35
Using a Different LSM from the H... 15:55 - 16:25
Tutorial: Using Linux Primitives to Build Your Own Containers - Stéphane Graber & Christian Brau... 16:30 - 18:00
Coffee Break 10:35 - 10:55
Coffee Break 15:35 - 15:55
Lunch (Attendees on Own) 12:40 - 13:50
Registration 08:00 - 17:00
BoF: Simple Remote Attestation with Secure & Att...
The Linux Crypto API - Ard Biesheuvel, ARM Ltd. 09:00 - 09:45
OpenPOWER: Host OS (Linux Kernel) Secure Boot Ke... 09:45 - 10:30
Keylime - An Open Source TPM Project for Remote... 10:50 - 11:35
Securing TPM Secrets with TXT and Kernel Signatu... 11:35 - 12:20
LSM Stacking - What You Can Do N... 13:50 - 14:20
Upcoming x86 Technologies for Malicious Hypervis... 14:20 - 15:05
Zephyr Project Security Status - David Brown, Li... 15:25 - 16:10
Closing Remarks 16:10 - 16:15
Coffee Break 10:30 - 10:50
Coffee Break 15:05 - 15:25
Lunch (Attendees on Own) 12:20 - 13:50