We had an engaging and productive two days, with strong attendance throughout. We’ll likely follow a similar format next year at LinuxCon. I hope we can continue to expand the contributor base beyond mostly kernel developers. We’re doing ok, but can certainly do better. We’ll also look at finding a sponsor for food next year.
The event will be held over two days (18th & 19th August), starting with James Bottomley as the keynote speaker. The keynote will be followed by referred talks, group discussions, kernel security subsystem updates, and break-out sessions.
The refereed talks are:
Verified Component Firmware – Kees Cook, Google
Protecting the Android TCB with SELinux – Stephen Smalley, NSA
Tizen, Security and the Internet of Things – Casey Schaufler, Intel
Capsicum on Linux – David Drysdale, Google
Quantifying and Reducing the Kernel Attack Surface – Anil Kurmus, IBM
Extending the Linux Integrity Subsystem for TCB Protection – David Safford & Mimi Zohar, IBM
Application Confinement with User Namespaces – Serge Hallyn & Stéphane Graber, Canonical
Discussion session topics include Trusted Kernel Lock-down Patch Series, led by Kees Cook; and EXT4 Encryption, led by Michael Halcrow & Ted Ts’o. There’ll be kernel security subsystem updates from the SELinux, AppArmor, Smack, and Integrity maintainers. The break-out sessions are open format and a good opportunity to collaborate face-to-face on outstanding or emerging issues.
The CFP for the 2014 Linux Security Summit is announced.
LSS 2014 will be co-located with LinuxCon North America in Chicago, on the 18th and 19th of August. We’ll also be co-located with the Kernel Summit this year.
Note that, as always, we’re looking for participation from the general Linux community — not just kernel people, and not just developers. We’re interested in hearing about feedback from users, and discussing what kinds of security problems we need to be addressing into the future.
This year, we’re looking for discussion topics as well as paper presentations, so if you have anything interesting to talk about, send in a proposal.
The 2014 Linux Security Summit will be held on the 18th and 19th of August, co-located with LinuxCon in Chicago, IL, USA. The Kernel Summit and several other events will also be co-located there this year.
The AppArmor Labeling Model (John Johansen, Canonical)
It looks like there’s been quite a lot happening in AppArmor. There’ll also be general project updates for SELinux, Smack, AppArmor and the Integrity subsystem, as well as a discussion on kernel coding anti-patterns led by Kees Cook.
There’ll be break-out sessions on the second day, details of which will be posted on the schedule as they’re known. If you’ll be at LSS (or LinuxCon/Plumbers generally) and would like to schedule a break-out session, contact the program committee per the details at the wiki page.
See everyone on the 19th and 20th of September in New Orleans!
The summit will be held across the 19th and 20th of September in New Orleans, co-located again with LinuxCon and Linux Plumbers. Note that presenters and attendees at LSS must be registered as LinuxCon attendees.
We’ll be following a similar format to last year, with a day of refereed presentations, followed by subsystem updates and break-out sessions on the second day. We’ll probably finish up around lunchtime on the Friday for people needing to head home that day, but check the final schedule for details once it’s published.
The CFP is open until 14th June, with speaker notifications to be posted by 21st June.
If you’ve been doing cool and interesting work in Linux security, be sure to submit a proposal!
It seems to have been a very successful event, with the move to a two-day format allowing for a day of refereed presentations, and then a day of more collaborative discussion. We’re aiming for a a similar format next year.
Thanks to everyone who made the event happen: presenters, attendees, the program committee, and of course, the great team at Linux Foundation, who made everything work flawlessly!
ETA: The slides from Matthew Garrett’s keynote on UEFI Secure Boot are now up.