Loading…
Attending this event?
September 16-17, 2024 | Vienna, Austria
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Linux Security Summit Europe 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Central European Summer Time (UTC+2). To see the schedule in your preferred timezone, please select from the drop-down at the bottom of the menu to the right.
Hall L3 clear filter
arrow_back View All Dates
Tuesday, September 17
 

09:00 CEST

Welcome Back & Remarks - Elena Reshetova, Intel
Tuesday September 17, 2024 09:00 - 09:05 CEST
Speakers
avatar for Elena Reshetova

Elena Reshetova

Security Architect, Intel
Elena Reshetova is a security architect and researcher at Intel working on various Linux security projects. Her current research interests evolve around Linux kernel hardening for the confidential cloud computing.
Tuesday September 17, 2024 09:00 - 09:05 CEST
Hall L3

09:05 CEST

Restricting Unprivileged User Namespaces in Ubuntu - John Johansen & Maxime Bélair, Canonical
Tuesday September 17, 2024 09:05 - 09:50 CEST
A retrospective on the work to restrict unprivileged user namespaces by default in Ubuntu 24.04. This presentation will cover the challenges, problems, and the solutions that Ubuntu choose. It will also take a look at work to address the problems that remain.
Speakers
avatar for John Johansen

John Johansen

Software Engineer, Canonical
John Johansen began working with open source software in the late 80s and began playing with Linux in 93. He completed a masters in mathematics at the University of Waterloo and the began working for Immunix doing compiler hardening, and then AppArmor. After Immunix was acquired by... Read More →
avatar for Maxime Bélair

Maxime Bélair

Security Engineer, PhD, Canonical
Maxime is a security engineer at Canonical. He currently works in the development of AppArmor
Tuesday September 17, 2024 09:05 - 09:50 CEST
Hall L3
  Refereed Presentations
  • Session Slides Attached Yes

09:55 CEST

Update on Landlock: IOCTL Support - Günther Noack, Google
Tuesday September 17, 2024 09:55 - 10:40 CEST
The Landlock security module lets Linux processes restrict what they can do and puts developers in charge of defining appropriate sandboxing policies for their programs. We will give a brief overview over Landlock’s current features, recent developments, and talk about what is next. We will discuss in more detail Landlock’s new support for restricting the use of IOCTL and the design considerations and trade-offs that went into it.
Speakers
avatar for Günther Noack

Günther Noack

Software Engineer, Google
Günther Noack is a software engineer at Google, where he works on security things. He has contributed to Landlock in the kernel since 2022 and maintains the Landlock Go library. In his free time, he enjoys running and swimming.
Tuesday September 17, 2024 09:55 - 10:40 CEST
Hall L3
  Refereed Presentations
  • Session Slides Attached Yes

11:10 CEST

LVBS and Advanced Kernel Integrity - Thara Gopinath, Microsoft
Tuesday September 17, 2024 11:10 - 11:55 CEST
Linux Virtualization based Security (LVBS) is a security feature that can a) harden the kernel and b) ensure that critical kernel resources remain untampered, even if the kernel gets compromised. VBS uses hardware virtualization and the hypervisor (Hyper-V) to create an isolated virtual environment that runs as a higher trust level, called Virtual Trust Level 1 (VTL1). In earlier talks on LVBS we explored the fundamentals of having a secure kernel running in VTL1 and how we support basic kernel integrity through LVBS. In this talk we explore how LVBS can be extended to offer advanced kernel integrity features. We examine the status quo in Linux kernel today and the various kernel features that manipulate page tables to inject/modify kernel code. We then discuss how these features can be hardened via LVBS to ensure that authenticity and integrity of the modified/loaded code can be ensured, even if the kernel is compromised. We will also present the status of our work in hardening some of these features. Finally, as future work we also explore hardening of key kernel data structures that are target to attack and present our goals in guarding them against unauthorized modification.
Speakers
avatar for Thara Gopinath

Thara Gopinath

Principal Software Engineering Lead, Microsoft
Thara Gopinath is a Principal Software Engineering Lead at Microsoft. She has been working on various Linux kernel subsystems since 2009 and currently leads the team implementing Linux Virtualization Based Security (LVBS) at Microsoft.
Tuesday September 17, 2024 11:10 - 11:55 CEST
Hall L3

12:00 CEST

Verifying and Signing EBPF Programs with Inspektor Gadget - Francis Laniel, Microsoft. NOTE: For Virtual Attendees - This Session Will Be Audio Only
Tuesday September 17, 2024 12:00 - 12:30 CEST
eBPF is now widely used, particularly in monitoring and observability. Sadly, it can modify the system behavior, by using helpers like bpf_override_return() or bpf_send_signal(). It was also the root cause of some CVEs, like CVE-2021-3489 or CVE-2021-3490. Inspektor Gadget is an eBPF tool and systems inspection framework for k8s, containers and linux hosts. eBPF programs run by Inspektor Gadget are packaged as OCI images. This was first done to ease users' lives so they can share and use other's. We also leveraged this to improve eBPF programs' security by signing and verifying them. This presentation will showcase how we make use of cosign to: 1. Sign our OCI images in our CI. 2. Verify them at runtime and deny the execution if the image was not signed with the given public key. Everyone can use Inspektor Gadget to sign and verify their eBPF programs with their own private key. It can then be used to increase overall security of eBPF programs by running only signed ones.
Speakers
avatar for Francis Laniel

Francis Laniel

Software Engineer, Microsoft
Francis has an interest in open source software, particularly the Linux kernel.He currently works at Microsoft where he focuses mainly on inspektor-gadget.
Tuesday September 17, 2024 12:00 - 12:30 CEST
Hall L3

14:00 CEST

Safer Seccomp: Dead Syscalls Elimination - Yuan Tan & Siqi Fan, Lanzhou University; Xiao Liu, Yunnan University
Tuesday September 17, 2024 14:00 - 14:30 CEST
Restricting system calls can significantly reduce the attack surface. However, solutions like seccomp can be bypassed(CVE-2009-0835, CVE-2019-2054, CVE-2023-2431, etc.). If unused syscalls can be eliminated at config level and compile time, the attack surface can be fundamentally controlled.
However, the widespread presence of .pushsection in kernel code prevents linker to perform code garbage collection. The associated KEEP() directive also causes ownership reversal issues, resulting in related sections that should be removed to remain, leaving more unused code for potential exploitation by hackers.
By systematically reworking the .pushsection directive, we propose dead syscalls elimination. After specifying the syscalls that need to be retained, it can remove other syscalls' code without affecting the normal operation of the kernel. Attackers cannot exploit something that does not exist. This not only reduces the kernel size and eliminates the overhead of seccomp but also completely eradicates the possibility of exploitation.
Besides, the approach of eliminating the KEEP() directive can be generalized, further reducing the kernel's dead code and decreasing the attack surface.

Contributors: Tan Yuan, Fan Siqi, Liu Xiao, Wu Zhangjin, Liu Xin
Speakers
avatar for Yuan Tan

Yuan Tan

Security Researcher, Lanzhou University
Student in Computer Science, specializing in security.
avatar for Siqi Fan

Siqi Fan

Lanzhou University
avatar for Xiao Liu

Xiao Liu

research assistant, Yunnan University
A speaker from Yunnan University
Tuesday September 17, 2024 14:00 - 14:30 CEST
Hall L3
  Short Topic Presentations
  • Session Slides Attached Yes

14:35 CEST

Systemd & TPMs - Lennart Poettering, Microsoft
Tuesday September 17, 2024 14:35 - 15:20 CEST
In this talk I'd like to give an update on what's new in systemd's various TPM related subsystems, such as disk encryption, PCR policy management, measurement APIs, event log and more.
Speakers
avatar for Lennart Poettering

Lennart Poettering

Principal Software Engineer, Microsoft
I work at Microsoft and hack on systemd.
Tuesday September 17, 2024 14:35 - 15:20 CEST
Hall L3

15:35 CEST

BoF Session
Tuesday September 17, 2024 15:35 - 16:35 CEST
Tuesday September 17, 2024 15:35 - 16:35 CEST
Hall L3
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Session Slides Attached
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -