The keynote will be presented by Ted Ts’o.
Refereed talks include:
- Embedded Linux Security (David Safford, IBM)
- Extending AppArmor Mediation into the Userspace (John Johansen, Canonical)
- Multiple Concurrent Security Models? Really? (Casey Schaufler, Intel)
- Linux Kernel ASLR (Kees Cook, Google)
- The AppArmor Labeling Model (John Johansen, Canonical)
It looks like there’s been quite a lot happening in AppArmor. There’ll also be general project updates for SELinux, Smack, AppArmor and the Integrity subsystem, as well as a discussion on kernel coding anti-patterns led by Kees Cook.
There’ll be break-out sessions on the second day, details of which will be posted on the schedule as they’re known. If you’ll be at LSS (or LinuxCon/Plumbers generally) and would like to schedule a break-out session, contact the program committee per the details at the wiki page.
See everyone on the 19th and 20th of September in New Orleans!
Whoops. Looks like I forgot to post my slides from last year’s LinuxCon Japan talk on the Linux kernel security subsystem.
Here they are:
The summit will be held across the 19th and 20th of September in New Orleans, co-located again with LinuxCon and Linux Plumbers. Note that presenters and attendees at LSS must be registered as LinuxCon attendees.
We’ll be following a similar format to last year, with a day of refereed presentations, followed by subsystem updates and break-out sessions on the second day. We’ll probably finish up around lunchtime on the Friday for people needing to head home that day, but check the final schedule for details once it’s published.
The CFP is open until 14th June, with speaker notifications to be posted by 21st June.
If you’ve been doing cool and interesting work in Linux security, be sure to submit a proposal!
It seems to have been a very successful event, with the move to a two-day format allowing for a day of refereed presentations, and then a day of more collaborative discussion. We’re aiming for a a similar format next year.
Thanks to everyone who made the event happen: presenters, attendees, the program committee, and of course, the great team at Linux Foundation, who made everything work flawlessly!
ETA: The slides from Matthew Garrett’s keynote on UEFI Secure Boot are now up.
Just to let folks know who are attending, we’ve added a lightning talks slot to the LSS 2012 schedule, on Friday 31st August at 2pm.
If you have any emerging topics to discuss, come along on the day and contact me to schedule a slot. We have one confirmed talk already: Dave Jones will be discussing his Trinity system call fuzzing work.
Note that this change pushes the LF Linux Security Workgroup BoF back thirty minutes.
On Day 1, we’re privileged to have a keynote by Matthew Garrett. He’s one of the best speakers in the community, and I believe he’ll be discussing secure boot.
Following the keynote, we have eight refereed presentations on new and interesting Linux security development topics.
On Day 2, we’ll have kernel security subsystem updates from maintainers, followed by an afternoon of breakout sessions. The breakout sessions are for deeper dives into specific areas, and may include development discussions and hack sessions. An BoF is planned to discuss an LF Security Workgroup, and attendees may propose more sessions in the leadup to the conference by emailing the program committee.
Thanks to all of the committee members for reviewing the proposals and helping to organize the summit — it’s shaping up as an interesting and productive event!
As many of you will know, I started a new role at Oracle earlier in the year, going to work on Chris Mason’s team. He announced this week that he’s moving onto a new position at Fusion-io. His leadership at Oracle will be missed, and I would like to congratulate him on his new role.
Also, just to head off the inevitable internet rumours, I thought I’d post here that I will be taking on many of Chris’s previous responsibilities at Oracle, including leading the mainline kernel development team. We’re actively hiring, by the way, so if you want to hack on the Linux kernel for a great company—remotely, from almost anywhere on the planet—email me :-)