-
09:00 • Welcome & Opening Remarks - Elena Reshetova, Intel
-
09:05 • Deep Analysis of Exploitable Linux Kernel Vulnerabilities 2017-2019 - Tong Lin & Luhai Chen, Intel
-
09:50 • Exploiting Race Conditions Using the Scheduler - Jann Horn, Google
-
10:55 • Dealing with Uninitialized Memory in the Kernel - Alexander Potapenko, Google
-
11:25 • A New Proposal for Protecting Kernel Data Memory - Igor Stoppa, Huawei
-
11:55 • Tracing: The Bane of You Security Folks - Steven Rostedt, VMware Inc
-
13:50 • Kernel Runtime Security Instrumentation - KP Singh, Google
-
14:35 • CRIU and SELinux - Adrian Reber, Red Hat
-
15:05 • Address Spaces for Namespaces - Mike Rapoport, IBM
-
15:55 • Using a Different LSM from the Host in a Container - John Johansen, Canonical
-
16:30 • Tutorial: Using Linux Primitives to Build Your Own Containers - Stéphane Graber & Christian Brauner, Canonical Ltd.