The CFP for the 2014 Linux Security Summit is announced.
LSS 2014 will be co-located with LinuxCon North America in Chicago, on the 18th and 19th of August. We’ll also be co-located with the Kernel Summit this year.
Note that, as always, we’re looking for participation from the general Linux community — not just kernel people, and not just developers. We’re interested in hearing about feedback from users, and discussing what kinds of security problems we need to be addressing into the future.
This year, we’re looking for discussion topics as well as paper presentations, so if you have anything interesting to talk about, send in a proposal.
The 2014 Linux Security Summit will be held on the 18th and 19th of August, co-located with LinuxCon in Chicago, IL, USA. The Kernel Summit and several other events will also be co-located there this year.
The AppArmor Labeling Model (John Johansen, Canonical)
It looks like there’s been quite a lot happening in AppArmor. There’ll also be general project updates for SELinux, Smack, AppArmor and the Integrity subsystem, as well as a discussion on kernel coding anti-patterns led by Kees Cook.
There’ll be break-out sessions on the second day, details of which will be posted on the schedule as they’re known. If you’ll be at LSS (or LinuxCon/Plumbers generally) and would like to schedule a break-out session, contact the program committee per the details at the wiki page.
See everyone on the 19th and 20th of September in New Orleans!
The summit will be held across the 19th and 20th of September in New Orleans, co-located again with LinuxCon and Linux Plumbers. Note that presenters and attendees at LSS must be registered as LinuxCon attendees.
We’ll be following a similar format to last year, with a day of refereed presentations, followed by subsystem updates and break-out sessions on the second day. We’ll probably finish up around lunchtime on the Friday for people needing to head home that day, but check the final schedule for details once it’s published.
The CFP is open until 14th June, with speaker notifications to be posted by 21st June.
If you’ve been doing cool and interesting work in Linux security, be sure to submit a proposal!
As previously mentioned, LSS this year will be a two-day event, co-located with LinuxCon.
On Day 1, we’re privileged to have a keynote by Matthew Garrett. He’s one of the best speakers in the community, and I believe he’ll be discussing secure boot.
Following the keynote, we have eight refereed presentations on new and interesting Linux security development topics.
On Day 2, we’ll have kernel security subsystem updates from maintainers, followed by an afternoon of breakout sessions. The breakout sessions are for deeper dives into specific areas, and may include development discussions and hack sessions. An BoF is planned to discuss an LF Security Workgroup, and attendees may propose more sessions in the leadup to the conference by emailing the program committee.
Thanks to all of the committee members for reviewing the proposals and helping to organize the summit — it’s shaping up as an interesting and productive event!
Just to let folk know — I’ll be giving a talk on the state of Linux kernel security development at LinuxCon Japan in Yokohama on June 8th. From the abstract:
In this talk, we’ll examine the current state of the Linux kernel security subsystem. Starting with a brief overview of existing features, we’ll discuss recent developments, current efforts and future directions. We’ll also discuss the evolving threat landscape, and the increasing need for mobile and cloud security. This will be a high-level technical discussion aimed at IT professionals. A good general knowledge of operating system and computer security concepts will be advantageous.
I’ll also likely be in Tokyo briefly — if any kernel security development folk there want to meet up, let me know.
This year, the summit will be a two-day event, co-located with LinuxCon, Linux Plumbers, and the Kernel Summit. We’re planning on holding developer break-out sessions for much of the second day, and extending the length of the main talks to the more traditional 45 minute + 15 minute break format. There will still be shorter 30 minute talks, and roundtable discussions.
Check out the programs from previous years to see what kind of proposals have been previously accepted: