Loading…
June 26 - 27 | Denver, Colorado
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Linux Security Summit North America 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Mountain Daylight Time (MDT | UTC-6). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."
Type: Refereed Presentation clear filter
arrow_back View All Dates
Thursday, June 26
 

9:05am MDT

Kernel Hardening: Ten Years Deep - Kees Cook, Google
Thursday June 26, 2025 9:05am - 9:50am MDT
The Linux Kernel Self-Protection Project was announced in 2015 as a way to gather folks doing security hardening work under a single umbrella and gain upstream traction for killing bug classes and eliminating exploitation methods. Linux security has made significant advances over the last decade as a result of the project's contributors.

We'll review the bug classes that have been completely eliminated (e.g. VLAs, setfs(), switch fall-through, stack variable zeroing), as well as bug classes that have gained wide mitigation coverage (e.g. refcount overflow, FORTIFY_SOURCE, allocation overflow, array overflow). We'll take a look at exploit blocking methods now in place (e.g. vmap stack, W^X, KASLR, slab hardening, %p hashing, IBT/BTI, SCS, KCFI), and newly available attack surface reduction (e.g. seccomp, __ro_after_init, lockdown).

What has the impact been after all this work? We'll review bug class frequency and severity to examine the trends. With so much of the low hanging fruit getting handled, we're now faced with trickier problems such as Use After Free flaws. We'll take a look at what's on the horizon to solve this and other kernel self-protection concerns.
Speakers
avatar for Kees Cook

Kees Cook

Kernel Security Engineer, Google
Kees Cook has been working with Free Software since 1994, has been a Debian Developer since 2007, and has been a member of the Linux Kernel Technical Advisory Board since 2019. He is currently employed as a Linux kernel security engineer by Google, focusing on upstream kernel security... Read More →
Thursday June 26, 2025 9:05am - 9:50am MDT
Room BBB 3G+3H

9:55am MDT

Lessons Learned While Making an AppArmor Play Machine - Alexandre Pujol, Linagora
Thursday June 26, 2025 9:55am - 10:40am MDT
A Play Machine is what is called a system with root as the guest account with only Apparmor to restrict access. It aims to demonstrate that necessary security can be provided by Apparmor without any Unix permissions and thus that root is not everything in modern security.

This play machine uses the apparmor.d project with the Full System Policies (FSP) mode enabled and enforced.
FSP is a special mode of apparmor.d that aims to provide profiles and user roles for every process and users and that ensure no unconfined process can run on the system.

In this talk, we will review the main challenges we encountered — including the security architecture of the profiles, testing, and profile integration. We will also discuss the complications involved in providing open root access on a VM to everyone.

The profiles, tooling, and documentation for the project have been published at https://github.com/roddhjav/apparmor.d. The play machine itself is available at https://play.pujol.io/
Speakers
avatar for Alexandre Pujol

Alexandre Pujol

System Engineer, Linagora
Alexandre Pujol is a French system engineer at Linagora. He is is graduated from a PhD Student in computer security & privacy in University College Dublin, Ireland. His area of work includes user privacy, secret management, and system security. He is the author of multiple password-store... Read More →
Thursday June 26, 2025 9:55am - 10:40am MDT
Room BBB 3G+3H

11:05am MDT

SeaBee: Defense for the Defense - Alan Wandke & Jacob Satterfield, National Security Agency
Thursday June 26, 2025 11:05am - 11:50am MDT
In recent years, security researchers and companies have looked to eBPF to build innovative security mechanisms with kernel independent bytecode and a soft guarantee of runtime safety. eBPF and the eBPF LSM in particular are especially useful in environments with bespoke security requirements where other LSMs cannot be or are not used, or kernel rebooting/recompilation is undesirable.
However, eBPF programs, but their nature, present a unique security challenge: any privileged process can fully manipulate the inner workings of all eBPF objects. While SELinux provides a level of coarse-grained access control over eBPF, it is difficult for eBPF developers to tailor SELinux policy to protect their individual tools.
This talk attempts to fill the gap by presenting an eBPF-based mandatory access control framework for protecting eBPF-based tools. The framework uses a configurable policy and no code change required for other tools to opt-in. We will present the design, implementation, and a policy example. We will also highlight areas for future work in the eBPF and LSM subsystems to provide more granular access controls.
Speakers
avatar for Alan Wandke

Alan Wandke

Computer Systems Researcher, National Security Agency
Alan Wandke is a computer systems researcher within the Laboratory for Advanced Cybersecurity Research at the National Security Agency. His technical expertise includes computer science and cybersecurity with a focus on operating systems and cloud security. Recently his research focus... Read More →
avatar for Jacob Satterfield

Jacob Satterfield

Computer Systems Researcher, National Security Agency
Jacob Satterfield is a senior computer systems researcher within the Laboratory for Advanced Cybersecurity Research (LACR) organization of the National Security Agency, where he performs R&D on novel Linux security mechanisms and trusted computing technologies. His technical experience... Read More →
Thursday June 26, 2025 11:05am - 11:50am MDT
Room BBB 3G+3H

1:40pm MDT

Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL - Xuan Xing & Eugene Rodionov, Google
Thursday June 26, 2025 1:40pm - 2:25pm MDT
Kernel fuzzing has been traditionally done either via on-device fuzzing or using VMs and primarily targeting the attack surface exposed to user-space programs.
In this talk the authors introduce a novel approach towards fuzzing Linux kernel interfaces completely in user space without relying on hardware or virtualization solutions by leveraging an open-source project LKL (Linux kernel library). Using LKL it is possible to build Linux kernel as a user-space library and hook it with a coverage-guided engine such as libFuzzer to fuzz kernel interfaces. This approach enables us to create lightweight coverage-guided modular fuzzers targeting specific kernel interfaces. This approach provides such advantages as high fuzzing performance, scalability and ease of debugging crashes. One of the major highlights of this approach is the ability to target device-to-kernel interfaces exposed to the malicious peripheral devices which are difficult to cover using traditional fuzzing approaches. We will provide deep dive into LKL fuzzing details, like enabling ASAN for LKL, adding code coverage, and showcase examples of fuzzing USB HID and Android binder driver.
Speakers
avatar for Xuan Xing

Xuan Xing

Manager of Google Android Red Team, Google
Xuan Xing is manager of Android RedTeam at Google. For the past several years, Xuan focused on finding security vulnerabilities in various low level components of Android/Pixel devices. He is passionate about software fuzzing for security research. Xuan has been a speaker at multiple... Read More →
avatar for Eugene Rodionov

Eugene Rodionov

Security Engineer, Google
Eugene Rodionov is a Security Engineer at Google on the Android Red Team. In his current position, Eugene focuses on finding and exploiting vulnerabilities in the low-level components of Android platform. His fields of interest include reverse engineering, vulnerability analysis... Read More →
Thursday June 26, 2025 1:40pm - 2:25pm MDT
Room BBB 3G+3H

2:30pm MDT

Putting Together a Secure Virtualization and Containerization Platform - Stéphane Graber, Zabbly
Thursday June 26, 2025 2:30pm - 3:15pm MDT
Incus is a project providing a private cloud platform that can be used by anyone from running on a simple laptop, Raspberry Pi to being run on thousands of servers in the datacenter.

The project began like most, making source code releases which found their way packaged in distros.

Over time, we developed tooling to automate deployment of those packages, allowing for more consistent deployments.
Unfortunately, this tooling still assumed quite a bit of familiarity with Linux distributions and configuration.

What we really wanted was a way to get reliable, identical deployments that could be used both by very large scale users running thousands of servers as well as by regular users at home who just want a working reliable virtualization platform.

This led to the development of Incus OS. A Debian based OS image made using systemd's mkosi, using a Secure Boot signed bootloader and Unified Kernel Image, TPM measurements throughout the boot process, an immutable OS image (using dm-verity) and full disk encryption for the data at rest based on TPM register state.

In this talk, we'll be diving into the design decisions behind Incus OS and look at its implementation.
Speakers
avatar for Stéphane Graber

Stéphane Graber

Incus maintainer, Zabbly
Stéphane is the project leader of the Linux Containers project, a long term open source contributor and conference organizer.He's the owner of Zabbly who provides support and development services on top of Incus.He's also co-founder and CTO of FuturFusion, another Incus related business... Read More →
Thursday June 26, 2025 2:30pm - 3:15pm MDT
Room BBB 3G+3H
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -