Loading…
June 26 - 27 | Denver, Colorado
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Linux Security Summit North America 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Mountain Daylight Time (MDT | UTC-6). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."
Venue: Room BBB 3G+3H clear filter
arrow_back View All Dates
Thursday, June 26
 

9:00am MDT

Welcome + Opening Remarks - James Morris, Microsoft
Thursday June 26, 2025 9:00am - 9:05am MDT
Speakers
avatar for James Morris

James Morris

Linux Kernel & Security Manager, Microsoft
James is the maintainer of the Linux security subsystem, and engineering manager at Microsoft.
Thursday June 26, 2025 9:00am - 9:05am MDT
Room BBB 3G+3H

9:05am MDT

Kernel Hardening: Ten Years Deep - Kees Cook, Google
Thursday June 26, 2025 9:05am - 9:50am MDT
The Linux Kernel Self-Protection Project was announced in 2015 as a way to gather folks doing security hardening work under a single umbrella and gain upstream traction for killing bug classes and eliminating exploitation methods. Linux security has made significant advances over the last decade as a result of the project's contributors.

We'll review the bug classes that have been completely eliminated (e.g. VLAs, setfs(), switch fall-through, stack variable zeroing), as well as bug classes that have gained wide mitigation coverage (e.g. refcount overflow, FORTIFY_SOURCE, allocation overflow, array overflow). We'll take a look at exploit blocking methods now in place (e.g. vmap stack, W^X, KASLR, slab hardening, %p hashing, IBT/BTI, SCS, KCFI), and newly available attack surface reduction (e.g. seccomp, __ro_after_init, lockdown).

What has the impact been after all this work? We'll review bug class frequency and severity to examine the trends. With so much of the low hanging fruit getting handled, we're now faced with trickier problems such as Use After Free flaws. We'll take a look at what's on the horizon to solve this and other kernel self-protection concerns.
Speakers
avatar for Kees Cook

Kees Cook

Kernel Security Engineer, Google
Kees Cook has been working with Free Software since 1994, has been a Debian Developer since 2007, and has been a member of the Linux Kernel Technical Advisory Board since 2019. He is currently employed as a Linux kernel security engineer by Google, focusing on upstream kernel security... Read More →
Thursday June 26, 2025 9:05am - 9:50am MDT
Room BBB 3G+3H

9:55am MDT

Lessons Learned While Making an AppArmor Play Machine - Alexandre Pujol, Linagora
Thursday June 26, 2025 9:55am - 10:40am MDT
A Play Machine is what is called a system with root as the guest account with only Apparmor to restrict access. It aims to demonstrate that necessary security can be provided by Apparmor without any Unix permissions and thus that root is not everything in modern security.

This play machine uses the apparmor.d project with the Full System Policies (FSP) mode enabled and enforced.
FSP is a special mode of apparmor.d that aims to provide profiles and user roles for every process and users and that ensure no unconfined process can run on the system.

In this talk, we will review the main challenges we encountered — including the security architecture of the profiles, testing, and profile integration. We will also discuss the complications involved in providing open root access on a VM to everyone.

The profiles, tooling, and documentation for the project have been published at https://github.com/roddhjav/apparmor.d. The play machine itself is available at https://play.pujol.io/
Speakers
avatar for Alexandre Pujol

Alexandre Pujol

System Engineer, Linagora
Alexandre Pujol is a French system engineer at Linagora. He is is graduated from a PhD Student in computer security & privacy in University College Dublin, Ireland. His area of work includes user privacy, secret management, and system security. He is the author of multiple password-store... Read More →
Thursday June 26, 2025 9:55am - 10:40am MDT
Room BBB 3G+3H

11:05am MDT

SeaBee: Defense for the Defense - Alan Wandke & Jacob Satterfield, National Security Agency
Thursday June 26, 2025 11:05am - 11:50am MDT
In recent years, security researchers and companies have looked to eBPF to build innovative security mechanisms with kernel independent bytecode and a soft guarantee of runtime safety. eBPF and the eBPF LSM in particular are especially useful in environments with bespoke security requirements where other LSMs cannot be or are not used, or kernel rebooting/recompilation is undesirable.
However, eBPF programs, but their nature, present a unique security challenge: any privileged process can fully manipulate the inner workings of all eBPF objects. While SELinux provides a level of coarse-grained access control over eBPF, it is difficult for eBPF developers to tailor SELinux policy to protect their individual tools.
This talk attempts to fill the gap by presenting an eBPF-based mandatory access control framework for protecting eBPF-based tools. The framework uses a configurable policy and no code change required for other tools to opt-in. We will present the design, implementation, and a policy example. We will also highlight areas for future work in the eBPF and LSM subsystems to provide more granular access controls.
Speakers
avatar for Alan Wandke

Alan Wandke

Computer Systems Researcher, National Security Agency
Alan Wandke is a computer systems researcher within the Laboratory for Advanced Cybersecurity Research at the National Security Agency. His technical expertise includes computer science and cybersecurity with a focus on operating systems and cloud security. Recently his research focus... Read More →
avatar for Jacob Satterfield

Jacob Satterfield

Computer Systems Researcher, National Security Agency
Jacob Satterfield is a senior computer systems researcher within the Laboratory for Advanced Cybersecurity Research (LACR) organization of the National Security Agency, where he performs R&D on novel Linux security mechanisms and trusted computing technologies. His technical experience... Read More →
Thursday June 26, 2025 11:05am - 11:50am MDT
Room BBB 3G+3H

11:55am MDT

Ubuntu Permission Prompting - John Johansen, Canonical
Thursday June 26, 2025 11:55am - 12:25pm MDT
Ubuntu 24.10 introduced permissions prompting as a an experimental feature to improve security and confidentiality for the Linux desktop. Traditionally Linux desktop applications have not been designed to be sandboxed and separated like android or iOS applications, making them difficult to isolate within the desktop environment. While applications written to support portals can be sandboxed within the modern desktop there are many applications that have not been updated to support them. This presentation will discuss and dive into what Ubuntu is doing to bring confinement and data confidentiality to traditional and legacy applications.
Speakers
avatar for John Johansen

John Johansen

Security Engineer, Canonical
John Johansen began working with open source software in the late 80s and began playing with Linux in 93. He completed a masters in mathematics at the University of Waterloo and the began working for Immunix doing compiler hardening, and then AppArmor. After Immunix was acquired by... Read More →
Thursday June 26, 2025 11:55am - 12:25pm MDT
Room BBB 3G+3H

1:40pm MDT

Bypass Kernel Barriers: Fuzzing Linux Kernel in Userspace With LKL - Xuan Xing & Eugene Rodionov, Google
Thursday June 26, 2025 1:40pm - 2:25pm MDT
Kernel fuzzing has been traditionally done either via on-device fuzzing or using VMs and primarily targeting the attack surface exposed to user-space programs.
In this talk the authors introduce a novel approach towards fuzzing Linux kernel interfaces completely in user space without relying on hardware or virtualization solutions by leveraging an open-source project LKL (Linux kernel library). Using LKL it is possible to build Linux kernel as a user-space library and hook it with a coverage-guided engine such as libFuzzer to fuzz kernel interfaces. This approach enables us to create lightweight coverage-guided modular fuzzers targeting specific kernel interfaces. This approach provides such advantages as high fuzzing performance, scalability and ease of debugging crashes. One of the major highlights of this approach is the ability to target device-to-kernel interfaces exposed to the malicious peripheral devices which are difficult to cover using traditional fuzzing approaches. We will provide deep dive into LKL fuzzing details, like enabling ASAN for LKL, adding code coverage, and showcase examples of fuzzing USB HID and Android binder driver.
Speakers
avatar for Xuan Xing

Xuan Xing

Manager of Google Android Red Team, Google
Xuan Xing is manager of Android RedTeam at Google. For the past several years, Xuan focused on finding security vulnerabilities in various low level components of Android/Pixel devices. He is passionate about software fuzzing for security research. Xuan has been a speaker at multiple... Read More →
avatar for Eugene Rodionov

Eugene Rodionov

Security Engineer, Google
Eugene Rodionov is a Security Engineer at Google on the Android Red Team. In his current position, Eugene focuses on finding and exploiting vulnerabilities in the low-level components of Android platform. His fields of interest include reverse engineering, vulnerability analysis... Read More →
Thursday June 26, 2025 1:40pm - 2:25pm MDT
Room BBB 3G+3H

2:30pm MDT

Putting Together a Secure Virtualization and Containerization Platform - Stéphane Graber, Zabbly
Thursday June 26, 2025 2:30pm - 3:15pm MDT
Incus is a project providing a private cloud platform that can be used by anyone from running on a simple laptop, Raspberry Pi to being run on thousands of servers in the datacenter.

The project began like most, making source code releases which found their way packaged in distros.

Over time, we developed tooling to automate deployment of those packages, allowing for more consistent deployments.
Unfortunately, this tooling still assumed quite a bit of familiarity with Linux distributions and configuration.

What we really wanted was a way to get reliable, identical deployments that could be used both by very large scale users running thousands of servers as well as by regular users at home who just want a working reliable virtualization platform.

This led to the development of Incus OS. A Debian based OS image made using systemd's mkosi, using a Secure Boot signed bootloader and Unified Kernel Image, TPM measurements throughout the boot process, an immutable OS image (using dm-verity) and full disk encryption for the data at rest based on TPM register state.

In this talk, we'll be diving into the design decisions behind Incus OS and look at its implementation.
Speakers
avatar for Stéphane Graber

Stéphane Graber

Incus maintainer, Zabbly
Stéphane is the project leader of the Linux Containers project, a long term open source contributor and conference organizer.He's the owner of Zabbly who provides support and development services on top of Incus.He's also co-founder and CTO of FuturFusion, another Incus related business... Read More →
Thursday June 26, 2025 2:30pm - 3:15pm MDT
Room BBB 3G+3H

3:40pm MDT

Getting on the Same (Virtual Memory) Page: A Roundtable on Data-only Attack Mitigations - Maxwell Bland, Motorola (Lenovo)
Thursday June 26, 2025 3:40pm - 4:10pm MDT
This session is a short, open discussion on strategies and mechanisms for mitigating malicious modifications to structures in the data and bss segments as well as the heap of the kernel. We will overview case studies for how these attacks work across various types of CVEs, as well as existing protections, from those requiring new hardware (ARM MTE, TMDFI), to those working with existing hardware (ARM POE + kpkeys, HVCI/Heki-style enforcement systems), to software approaches (compiler-enforced data-flow, allocator restrictions, data layout randomization). We will then turn to an open discussion session of the benefits and drawbacks of offered protections, to (1) identify just how difficult we can make it for attackers using current mechanisms, (2) pinpoint precise gaps to focus in on for future work, and (3) come up with solutions to the harder problems involved, such as determining what is a "valid" write.

Refs.
https://lore.kernel.org/all/uqgb234tm4svoz2yvbamzal2srxnjnwrj2coiimvuz5bzblbia@pfabobbxo2jf/
https://lore.kernel.org/all/a32cjyekuecoowzbitc2xykilvpu6l3jjtityp7x5hw7xbiysp@5l2lptwmqiug/
https://www.usenix.org/system/files/usenixsecurity24-johannesmeyer.pdf
Speakers
avatar for Maxwell Bland

Maxwell Bland

Security Researcher, Motorola (Lenovo)
Maxwell is a security researcher at Motorola working on hypervisor-enforced kernel protection systems for Android phones, motivated by his empirical study of mobile device malware and OS exploit PoC's. Prior to joining Motorola, Maxwell received his doctorate from UIUC, where he worked... Read More →
Thursday June 26, 2025 3:40pm - 4:10pm MDT
Room BBB 3G+3H

4:15pm MDT

Integrating Confidential Computing Into Cloud Infrastructure: Challenges and Opportunities - Carlos Bilbao, DigitalOcean
Thursday June 26, 2025 4:15pm - 4:45pm MDT
As confidential computing (CoCo) tech matures, integrating it into the cloud presents both technical challenges and opportunities. Specifically, the deployment of CoCo in a multi-tenant cloud infrastructure involves technical hurdles, such as remote boot and attestation, the impact on product aspects like provisioning time and live migration, tool compatibility, and constraints in fleet observability and debugging -- such as root cause analysis of guest kernel crashes (with customer permission).

In our previous presentation at LSS, we discussed the disconnect between CoCo efforts and the broader Linux kernel community. Since then, the desire to harden guest VMs against confidentiality threats has grown stronger, and a key question now is how to integrate CoCo into the cloud. Drawing from my professional experience, I’d like to spark and guide a discussion on the practical steps required to achieve this.
Speakers
avatar for Carlos Bilbao

Carlos Bilbao

Sr. Systems Engineer, DigitalOcean
Carlos Bilbao, PhD., is a Linux kernel engineer interested in confidential computing, virtualization, and resource management research. He contributed to the development of the first threat model for confidential computing in virtual environments, which was accepted into the kernel... Read More →
Thursday June 26, 2025 4:15pm - 4:45pm MDT
Room BBB 3G+3H

4:50pm MDT

BoF Session
Thursday June 26, 2025 4:50pm - 5:50pm MDT
Thursday June 26, 2025 4:50pm - 5:50pm MDT
Room BBB 3G+3H
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -