Loading…
June 26 - 27 | Denver, Colorado
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Linux Security Summit North America 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Mountain Daylight Time (MDT | UTC-6). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."
Type: Short Topic clear filter
Thursday, June 26
 

11:55am MDT

Ubuntu Permission Prompting - John Johansen, Canonical
Thursday June 26, 2025 11:55am - 12:25pm MDT
Ubuntu 24.10 introduced permissions prompting as a an experimental feature to improve security and confidentiality for the Linux desktop. Traditionally Linux desktop applications have not been designed to be sandboxed and separated like android or iOS applications, making them difficult to isolate within the desktop environment. While applications written to support portals can be sandboxed within the modern desktop there are many applications that have not been updated to support them. This presentation will discuss and dive into what Ubuntu is doing to bring confinement and data confidentiality to traditional and legacy applications.
Speakers
avatar for John Johansen

John Johansen

Security Engineer, Canonical
John Johansen began working with open source software in the late 80s and began playing with Linux in 93. He completed a masters in mathematics at the University of Waterloo and the began working for Immunix doing compiler hardening, and then AppArmor. After Immunix was acquired by... Read More →
Thursday June 26, 2025 11:55am - 12:25pm MDT
Room BBB 3G+3H

3:40pm MDT

Getting on the Same (Virtual Memory) Page: A Roundtable on Data-only Attack Mitigations - Maxwell Bland, Motorola (Lenovo)
Thursday June 26, 2025 3:40pm - 4:10pm MDT
This session is a short, open discussion on strategies and mechanisms for mitigating malicious modifications to structures in the data and bss segments as well as the heap of the kernel. We will overview case studies for how these attacks work across various types of CVEs, as well as existing protections, from those requiring new hardware (ARM MTE, TMDFI), to those working with existing hardware (ARM POE + kpkeys, HVCI/Heki-style enforcement systems), to software approaches (compiler-enforced data-flow, allocator restrictions, data layout randomization). We will then turn to an open discussion session of the benefits and drawbacks of offered protections, to (1) identify just how difficult we can make it for attackers using current mechanisms, (2) pinpoint precise gaps to focus in on for future work, and (3) come up with solutions to the harder problems involved, such as determining what is a "valid" write.

Refs.
https://lore.kernel.org/all/uqgb234tm4svoz2yvbamzal2srxnjnwrj2coiimvuz5bzblbia@pfabobbxo2jf/
https://lore.kernel.org/all/a32cjyekuecoowzbitc2xykilvpu6l3jjtityp7x5hw7xbiysp@5l2lptwmqiug/
https://www.usenix.org/system/files/usenixsecurity24-johannesmeyer.pdf
Speakers
avatar for Maxwell Bland

Maxwell Bland

Security Researcher, Motorola (Lenovo)
Maxwell is a security researcher at Motorola working on hypervisor-enforced kernel protection systems for Android phones, motivated by his empirical study of mobile device malware and OS exploit PoC's. Prior to joining Motorola, Maxwell received his doctorate from UIUC, where he worked... Read More →
Thursday June 26, 2025 3:40pm - 4:10pm MDT
Room BBB 3G+3H

4:15pm MDT

Integrating Confidential Computing Into Cloud Infrastructure: Challenges and Opportunities - Carlos Bilbao, DigitalOcean
Thursday June 26, 2025 4:15pm - 4:45pm MDT
As confidential computing (CoCo) tech matures, integrating it into the cloud presents both technical challenges and opportunities. Specifically, the deployment of CoCo in a multi-tenant cloud infrastructure involves technical hurdles, such as remote boot and attestation, the impact on product aspects like provisioning time and live migration, tool compatibility, and constraints in fleet observability and debugging -- such as root cause analysis of guest kernel crashes (with customer permission).

In our previous presentation at LSS, we discussed the disconnect between CoCo efforts and the broader Linux kernel community. Since then, the desire to harden guest VMs against confidentiality threats has grown stronger, and a key question now is how to integrate CoCo into the cloud. Drawing from my professional experience, I’d like to spark and guide a discussion on the practical steps required to achieve this.
Speakers
avatar for Carlos Bilbao

Carlos Bilbao

Sr. Systems Engineer, DigitalOcean
Carlos Bilbao, PhD., is a Linux kernel engineer interested in confidential computing, virtualization, and resource management research. He contributed to the development of the first threat model for confidential computing in virtual environments, which was accepted into the kernel... Read More →
Thursday June 26, 2025 4:15pm - 4:45pm MDT
Room BBB 3G+3H
 
Friday, June 27
 

11:55am MDT

Handling New Syscalls in Seccomp Filters - Tom Hromatka, Oracle Corporate & Paul Moore, Microsoft
Friday June 27, 2025 11:55am - 12:25pm MDT
Currently libseccomp can be used to build two categories of filters - an "allow" list and a "deny" list.

- In an allow list, the user specifies the syscalls to be allowed (read, write, etc.), and all other syscalls are denied by default
- In a deny list, the user specifies the syscalls that are deemed too powerful or dangerous and explicitly blocks them. All other syscalls are allowed by default

Both of these filters have a significant shortcoming when the system is updated to a newer kernel with new syscalls. Allow lists will block new syscalls, and this could lead to containers failing to run. Deny lists will allow new syscalls (even if they're dangerous) which could provide an attack vector for malicious applications.

We, the libseccomp developers, have proposed a solution for the above problem.
https://github.com/seccomp/libseccomp/pull/457

Our goal for this talk is a discussion between the libseccomp developers and the LSS audience. How are attendees solving this problem today? Does the proposed functionality and API meet their needs and offer a better solution? What other suggestions might the attendees have regarding kernel version based syscall filtering?
Speakers
avatar for Tom Hromatka

Tom Hromatka

Software Engineer, Oracle Corporation
Tom Hromatka has worked in a wide variety of software engineering fields since 2002 and is currently focusing on resource management at Oracle. He is a Linux kernel contributor and maintains the libseccomp, libcgroup, and adaptived userspace libraries.
avatar for Paul Moore

Paul Moore

Principal Software Engineer, Microsoft
Paul Moore has been involved in various Linux platform security efforts since 2004 at Hewlett-Packard, Red Hat, Cisco, and Microsoft. He currently maintains the Linux Security Module (LSM) layer as well as the SELinux, audit, and labeled networking subsystems in the Linux Kernel... Read More →
Friday June 27, 2025 11:55am - 12:25pm MDT
Room BBB 3G+3H
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.