Loading…
28 - 29 August | Amsterdam, Netherlands
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Linux Security Summit Europe 2025 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Central European Summer Time (CEST | UTC+2). To see the schedule in your preferred timezone, please select from the drop-down menu to the right, above "Filter by Date."
Venue: G102-103 clear filter
arrow_back View All Dates
Thursday, August 28
 

09:00 CEST

Welcome + Opening Remarks - Elena Reshetova, Security Architect, Intel
Thursday August 28, 2025 09:00 - 09:05 CEST
Speakers
avatar for Elena Reshetova

Elena Reshetova

Security Architect, Intel
Elena Reshetova is a security architect and researcher at Intel working on various Linux security projects. Her current research interests evolve around Linux kernel hardening for the confidential cloud computing.
Thursday August 28, 2025 09:00 - 09:05 CEST
G102-103

09:05 CEST

Linux and CHERI: Back to the Future - Carl Shaw, Codasip
Thursday August 28, 2025 09:05 - 09:50 CEST
Speakers
avatar for Carl Shaw

Carl Shaw

Safety and Security Manager, Codasip
Prior to joining Codasip, Carl has provided security engineering and architecture consultancy to leading global electronics and semiconductor companies for more than 15 years. With a Physics Ph.D., and a career mixing electronics design in government defense, and OS and firmware development... Read More →
Thursday August 28, 2025 09:05 - 09:50 CEST
G102-103

09:55 CEST

Protecting the Protector : How LSMs Can Benefit From Linux Virtualization Based Security - Thara Gopinath & James Morris, Microsoft
Thursday August 28, 2025 09:55 - 10:25 CEST
Linux Security Module Framework provides a mechanism to extend kernel's security promises and enforce access control policies. In this talk we aim to examine how various pieces of LSM framework can benefit from an extra layer of protection through Linux Virtualization Based Security (LVBS) which is a security feature that implements kernel integrity via hardware virtualization features and hypervisors.
Speakers
avatar for Thara Gopinath

Thara Gopinath

Principal Software Eng Lead, Microsoft
Thara Gopinath is a Principal Software Engineering Lead at Microsoft. She has been working on various Linux kernel subsystems since 2009 and currently leads the team implementing Linux Virtualization Based Security (LVBS) at Microsoft.
avatar for James Morris

James Morris

Principal Software Engineering Manager, Microsoft
Software Engineering Manager
Thursday August 28, 2025 09:55 - 10:25 CEST
G102-103

10:25 CEST

Morning Break
Thursday August 28, 2025 10:25 - 10:55 CEST
Thursday August 28, 2025 10:25 - 10:55 CEST
G102-103

10:55 CEST

Supporting Kernel Memory Integrity Through LVBS - Thara Gopinath & Femi Adeyemi, Microsoft
Thursday August 28, 2025 10:55 - 11:40 CEST
Linux Virtualization based Security (LVBS) is a security feature that leverages hypervisors to a) harden the kernel and b) ensure that critical kernel resources remain untampered, even if the guest kernel gets compromised by creating an isolated environment that runs at a higher trust level than the normal operating environment. A key kernel integrity feature of LVBS is to ensure that kernel memory protections (read-only, W^X) are backed up by this trusted environment using Second Level Page Tables so that even if the guest kernel is compromised, the kernel memory cannot be tampered with.
One of the challenges in enabling hypervisor-enforced kernel memory protection is that the Linux kernel inherently supports features that either modify existing kernel code or inject code into the kernel memory space. In this talk, we aim to examine a comprehensive list of such kernel features (which are inherently easier exploit surfaces) and then discuss how these features can be hardened via LVBS to ensure that the integrity and authenticity of patched code, even if the kernel is compromised. Finally, we present the status of our work in implementing these hardenings.
Speakers
avatar for Thara Gopinath

Thara Gopinath

Principal Software Eng Lead, Microsoft
Thara Gopinath is a Principal Software Engineering Lead at Microsoft. She has been working on various Linux kernel subsystems since 2009 and currently leads the team implementing Linux Virtualization Based Security (LVBS) at Microsoft.
avatar for Femi Adeyemi

Femi Adeyemi

Senior Software Engineer @ Microsoft, working on Virtualization Based Security, Microsoft
Femi Adeyemi is a Senior Software Engineer at Microsoft, enhancing Linux kernel security using virtualization technologies
Thursday August 28, 2025 10:55 - 11:40 CEST
G102-103

11:45 CEST

Kernel Hardening With Protection Keys - Kevin Brodsky, Arm
Thursday August 28, 2025 11:45 - 12:15 CEST
Protecting the kernel from data-only attacks is a growing concern that is increasingly addressed through hypervisor-based solutions. A lightweight alternative may be found in protection keys (pkeys), a hardware mechanism that provides a per-thread and easily switchable view of memory. While pkeys are currently available to userspace on supported architectures, their potential for enhancing kernel security remains unused.

This talk demonstrates how pkeys can be leveraged within the kernel to protect critical data structures, such as page tables and credentials. We will show how this approach can be implemented and present an evaluation of its performance impact on arm64, illustrating its feasibility for real-world deployment.

Attendees will leave with a deeper understanding of how pkeys can enhance kernel security, the trade-offs involved, and the potential for adoption in future Linux hardening efforts.
Speakers
avatar for Kevin Brodsky

Kevin Brodsky

Staff Software Engineer, Arm
Kevin is a software engineer at Arm. He specialises in the deployment of hardware security features, currently in the Linux kernel and previously on the Android platform. Having spent many years working on tag-based technologies (CHERI/Morello and memory tagging - MTE), he now focuses... Read More →
Thursday August 28, 2025 11:45 - 12:15 CEST
G102-103

12:15 CEST

Lunch
Thursday August 28, 2025 12:15 - 13:45 CEST
Thursday August 28, 2025 12:15 - 13:45 CEST
G102-103

13:45 CEST

IMA Update: Lessons Learned from Re-implementing IMA-measurement in User Space - Roberto Sassu, Huawei Technologies Duesseldorf GmbH
Thursday August 28, 2025 13:45 - 14:15 CEST
Integrity Measurement Architecture (IMA) was originally designed and developed by IBM Research to extend the trusted
boot chain of measurements to the running system. Subsequently, support for extending secure boot up to the running system (IMA-appraisal) was added and, with it, support for writing audit messages in the system logs.

For good and for bad, IMA-measurement and IMA-appraisal needed to be flexible to work in different environments from embedded/IoT to large systems. The original concepts of extending both trusted and secure boot have not changed, but some of the methods/designs could be improved.

This talk proposes a few kernel improvements based on our work in user space. First, it proposes a new design change to serialize and store the measurement list in a memory area shared between primary and secondary kernel, so that nothing needs to be done on kexec, as opposed to carrying out measurements from one kernel to another.

Second, it proposes a new testing tool for verifying that IMA reported a violation when a file is opened for read and
subsequently opened as write or vice-versa. Building on that, the talk also discusses a few alternatives on how to detect
such violations.

Finally, it proposes a new debugging technique, allowing to run a large number of integration tests without rebooting the
kernel.

Speakers
avatar for Roberto Sassu

Roberto Sassu

Principal Engineer, Huawei Technologies Duesseldorf GmbH
Roberto Sassu received a MsC in Information Security in 2008 and worked as a research assistant until 2014. He published and presented papers on Trusted Computing at STC'11 and TrustCom 2014. He also participated to several European projects (OpenTC, TClouds, SECURED and FutureTPM... Read More →
Thursday August 28, 2025 13:45 - 14:15 CEST
G102-103

14:20 CEST

AppArmor Update - John Johansen, Canonical
Thursday August 28, 2025 14:20 - 14:40 CEST
Speakers
avatar for John Johansen

John Johansen

Security Engineer, Canonical
John Johansen began working with open source software in the late 80s and began playing with Linux in 93. He completed a masters in mathematics at the University of Waterloo and the began working for Immunix doing compiler hardening, and then AppArmor. After Immunix was acquired by... Read More →
Thursday August 28, 2025 14:20 - 14:40 CEST
G102-103

14:45 CEST

SELinux Update - Paul Moore, Microsoft
Thursday August 28, 2025 14:45 - 15:05 CEST
Speakers
avatar for Paul Moore

Paul Moore

Principal Software Engineer, Microsoft
Paul Moore has been involved in various Linux platform security efforts since 2004 at Hewlett-Packard, Red Hat, Cisco, and Microsoft. He currently maintains the Linux Security Module (LSM) layer as well as the SELinux, audit, and labeled networking subsystems in the Linux Kernel... Read More →
Thursday August 28, 2025 14:45 - 15:05 CEST
G102-103

15:05 CEST

Afternoon Break
Thursday August 28, 2025 15:05 - 15:20 CEST
Thursday August 28, 2025 15:05 - 15:20 CEST
G102-103

15:20 CEST

BoF Session - Topic TBD
Thursday August 28, 2025 15:20 - 16:20 CEST
Thursday August 28, 2025 15:20 - 16:20 CEST
G102-103
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -