"
Cloud Security: Intel®’s Approach and Solutions
Through Confidential Computing Technology Offerings"
Nagaraju N Kodalapura, Lead Offensive Security Researcher, Intel. Time: 14th October, 2022, Friday 3:00 pm - 4:00 pm IST Abstract: The objective of this presentation is to
provide an overview of what’s Confidential Computing
and its significance to cloud security. Then we
shall briefly discuss about Intel’s TEEs (Trusted
Execution Environment) and their key role in
Confidential Computing, understand their security
objectives and a high level threat model. One of the
implicit objectives of this presentation is to bring
the “security awareness” and “security first
mindset” with the audience, followed by Q & A.
About speaker: Nagaraju N Kodalapura (Raju) is the Lead Offensive Security Researcher working in Intel Corporation for about 20+ years and has been working in the security research space for more than 10 years. He received his M.S. degree in Digital Design and Embedded Systems from Manipal University, India. He holds 5 Granted Patents and is a IEEE Senior Member with 5+ security research publications in IEEE, Black Hat and other renowned venues. He leads a team of offensive security researchers focusing on Confidential Computing and Virtualization technologies targeting cloud/datacentric platforms within IPAS (Intel Product Assurance and Security) organization. He is passionate about spirituality, technology and hardware security. |
"Transparent, Trustworthy and
Privacy-Preserving Supply Chain "
Prof. Salil Kanhere, UNSW Sydney, Australia. Recording of this talk: Click Here to view on YouTube Slides for this talk: Click Here to download Time: 1st July, 2022, Friday 3:00 pm - 4:00 pm IST Abstract: Over the years, supply chains have evolved
from a few regional traders to globally complex chains
of trade. Consequently, supply chain management
systems have become heavily dependent on digitisation
for the purpose of data storage and traceability of
goods. However, current approaches suffer from issues
such as scattering of information across multiple
silos, susceptibility of erroneous or untrustworthy
data, inability to accurately capture physical events
associated with the movement of goods and protection
of trade secrets. Our work aims to address above
mentioned challenges related to traceability,
scalability, trustworthiness and privacy. To support
traceability and provenance, a consortium blockchain
based framework, ProductChain, is proposed which
provides an immutable audit trail of product's supply
chain events and its origin. The framework also
presents a sharded network model to meet the
scalability needs of complex supply chains. Next, we
address the issue of trust associated with the
qualities of the commodities and the entities logging
data on the blockchain through an extensible
framework, TrustChain. TrustChain tracks interactions
among supply chain entities and dynamically assigns
trust and reputation scores to commodities and traders
using smart contracts. For protecting trade secrets,
we propose a privacy-preservation framework PrivChain,
which allows traders to keep trade related information
private and rather return computations or proofs on
data to support provenance and traceability claims.
The traders are in turn incentivised for providing
such proofs. A different privacy-preservation approach
for decoupling the identities of traders is explored
in TradeChain by managing two ledgers: one for
managing decentralised identities and another for
recording supply chain events. The information from
two ledgers is then collated using access tokens
provided by the data owners, i.e. traders themselves.
We will conclude the talk with some future directions.
About speaker: Salil Kanhere is a Professor in the School of Computer Science and Engineering at UNSW Sydney, Australia. He is also affiliated with the Cybersecurity Cooperative Research Centre (CSCRC) and the UNSW Institute for Cyber Security (IFCYBER). His research interests span the Internet of Things, pervasive computing, cybersecurity, blockchain and applied machine learning. He has published over 300 peer-reviewed articles and is leading several government and industry funded research projects on these topics. He received the Friedrich Wilhelm Bessel Research Award (2020) and the Humboldt Research Fellowship (2014), both from the Alexander von Humboldt Foundation in Germany. He is the recipient of 8 Best Paper Awards. Salil has held visiting positions at I2R Singapore, Technical University Darmstadt, University of Zurich and Graz University of Technology. He is a Senior Member of the IEEE and ACM, an ACM Distinguished Speaker and an IEEE Computer Society Distinguished Visitor. He serves as the Editor in Chief of the Ad Hoc Networks journal and as an Associate Editor of IEEE Transactions On Network and Service Management, Computer Communications, and Pervasive and Mobile Computing. He has served as General Chair and TPC Chair of several IEEE/ACM international conferences such as IEEE PerCom, IEEE ICBC, IEEE Blockchain, IEEE LCN, IEEE CNSM, IEEE WoWMoM and EWSN. Salil has co-authored a book titled Blockchain for Cyberphysical Systems published by Artech House in 2020. |
"Administrators are Users Too:
Understanding and Catering Security
for System Operators and Administrators" Prof. Frank Li, Georgia Institute of Technology, USA. Recording of this talk: Click Here to view on YouTube Slides for this talk: Click Here to download Time: 20th May, 2022, Friday 6:30 pm - 7:30 pm IST Abstract: Over the last
two decades, the computer security research community
has increasing recognized and embraced the
socio-technical nature of many security issues. As a
result, there has been rich and vibrant exploration of
human factors in security, particularly focused on
typical end users (e.g., PC/laptop and mobile device
users). However, until more recently, there has been
significantly less investigation into the operators
and administrators managing Internet systems for
various organizations. This population is a distinct
but important one, whose technical expertise and
unique responsibilities in maintaining their
organizations’ security distinguish them from end
users.
In this talk, I will highlight the importance of understanding how these operators manage the security of Internet systems. I will discuss several works that use Internet and web measurement techniques (e.g., Internet-wide scanning, web crawling) as well as traditional user studies to identify operator security behavior, and that develop socio-technical approaches to drive better security behavior. These works touch on aspects of patching vulnerabilities, correcting security misconfigurations, and managing online authentication. About speaker: Frank Li is an Assistant Professor at the Georgia Institute of Technology, jointly appointed in the newly formed School of Cybersecurity and Privacy and the School of Electrical and Computer Engineering. His research focuses on understanding and improving Internet security in a data-driven fashion, using various approaches including Internet measurements, user studies, and software analysis. His research has received two best paper awards (ACM IMC and USENIX SOUPS), and has been funded by the NSF, DARPA, and industry partners. He completed his Ph.D. in computer science at UC Berkeley and his B.S. in computer science from MIT. |