Loading…
Attending this event?
September 16-17, 2024 | Vienna, Austria
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Linux Security Summit Europe 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Central European Summer Time (UTC+2). To see the schedule in your preferred timezone, please select from the drop-down at the bottom of the menu to the right.
arrow_back View All Dates
Tuesday, September 17
 

09:05 CEST

Restricting Unprivileged User Namespaces in Ubuntu - John Johansen & Maxime Bélair, Canonical
Tuesday September 17, 2024 09:05 - 09:50 CEST
A retrospective on the work to restrict unprivileged user namespaces by default in Ubuntu 24.04. This presentation will cover the challenges, problems, and the solutions that Ubuntu choose. It will also take a look at work to address the problems that remain.
Speakers
avatar for John Johansen

John Johansen

Software Engineer, Canonical
John Johansen began working with open source software in the late 80s and began playing with Linux in 93. He completed a masters in mathematics at the University of Waterloo and the began working for Immunix doing compiler hardening, and then AppArmor. After Immunix was acquired by... Read More →
avatar for Maxime Bélair

Maxime Bélair

Security Engineer, PhD, Canonical
Maxime is a security engineer at Canonical. He currently works in the development of AppArmor
Tuesday September 17, 2024 09:05 - 09:50 CEST
Hall L3
  Refereed Presentations
  • Session Slides Attached Yes

09:55 CEST

Update on Landlock: IOCTL Support - Günther Noack, Google
Tuesday September 17, 2024 09:55 - 10:40 CEST
The Landlock security module lets Linux processes restrict what they can do and puts developers in charge of defining appropriate sandboxing policies for their programs. We will give a brief overview over Landlock’s current features, recent developments, and talk about what is next. We will discuss in more detail Landlock’s new support for restricting the use of IOCTL and the design considerations and trade-offs that went into it.
Speakers
avatar for Günther Noack

Günther Noack

Software Engineer, Google
Günther Noack is a software engineer at Google, where he works on security things. He has contributed to Landlock in the kernel since 2022 and maintains the Landlock Go library. In his free time, he enjoys running and swimming.
Tuesday September 17, 2024 09:55 - 10:40 CEST
Hall L3
  Refereed Presentations
  • Session Slides Attached Yes

14:00 CEST

Safer Seccomp: Dead Syscalls Elimination - Yuan Tan & Siqi Fan, Lanzhou University; Xiao Liu, Yunnan University
Tuesday September 17, 2024 14:00 - 14:30 CEST
Restricting system calls can significantly reduce the attack surface. However, solutions like seccomp can be bypassed(CVE-2009-0835, CVE-2019-2054, CVE-2023-2431, etc.). If unused syscalls can be eliminated at config level and compile time, the attack surface can be fundamentally controlled.
However, the widespread presence of .pushsection in kernel code prevents linker to perform code garbage collection. The associated KEEP() directive also causes ownership reversal issues, resulting in related sections that should be removed to remain, leaving more unused code for potential exploitation by hackers.
By systematically reworking the .pushsection directive, we propose dead syscalls elimination. After specifying the syscalls that need to be retained, it can remove other syscalls' code without affecting the normal operation of the kernel. Attackers cannot exploit something that does not exist. This not only reduces the kernel size and eliminates the overhead of seccomp but also completely eradicates the possibility of exploitation.
Besides, the approach of eliminating the KEEP() directive can be generalized, further reducing the kernel's dead code and decreasing the attack surface.

Contributors: Tan Yuan, Fan Siqi, Liu Xiao, Wu Zhangjin, Liu Xin
Speakers
avatar for Yuan Tan

Yuan Tan

Security Researcher, Lanzhou University
Student in Computer Science, specializing in security.
avatar for Siqi Fan

Siqi Fan

Lanzhou University
avatar for Xiao Liu

Xiao Liu

research assistant, Yunnan University
A speaker from Yunnan University
Tuesday September 17, 2024 14:00 - 14:30 CEST
Hall L3
  Short Topic Presentations
  • Session Slides Attached Yes
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Session Slides Attached
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -