Brussels / 2 & 3 February 2019

schedule

Security devroom


09 10 11 12 13 14 15 16 17 18
Sunday Open source software security testing
Crowd supported via bug bounty
TLS 1.3: what developers should know about the APIs Russian crypto algorithms in the OpenSource world
GOST crypto demystified
The new EU CyberSecurity Act
Or how to prevent the EU from becoming the worlds largest botnet honeypot
Tracking users with core Internet protocols
Enhancing privacy and performance the Internet
How to prevent cryptographic pitfalls by design USB borne attacks and usable defense mechanisms
Hardening built into the operating system without compromising on usability
No evidence of communication and implementing a protocol: Off-the-Record protocol version 4
Version 4 of OTR protocol
RecordFlux: Facilitating the Verification of Communication Protocols CHIPSEC on non-UEFI Platforms
Using CHIPSEC to harden firmware against attacks & exploits
Base64 is not encryption
A better story for Kubernetes Secrets
What are your users kubectl-ing into your Kubernetes cluster? Scale Your Auditing Events Fighting spam for fun and profit
the long road to SpamAssassin 4.0
Consistent PKCS#11 in Operating Systems
improving user experience and security in RHEL and Fedora

The security devroom topic this year is Operating System Security.

This year's topic is about the operating system components that make software secure and usable: security controls, security and usability, cryptography, secure communications etc. We welcome presentations which take into account these factors, and presentations that analyze other's solutions.

See https://github.com/security-devroom/fosdem-2019 for more information.

Event Speakers Start End

Sunday

  Open source software security testing
Crowd supported via bug bounty
Stijn Jans 09:30 09:55
  TLS 1.3: what developers should know about the APIs Daiki Ueno 10:00 10:25
  Russian crypto algorithms in the OpenSource world
GOST crypto demystified
Dmitry Eremin-Solenikov (Lumag) 10:30 10:55
  The new EU CyberSecurity Act
Or how to prevent the EU from becoming the worlds largest botnet honeypot
Hans de Raad (OpenNovations) 11:00 11:25
  Tracking users with core Internet protocols
Enhancing privacy and performance the Internet
Tobias Mueller 11:30 11:55
  How to prevent cryptographic pitfalls by design Maximilian Blochberger 12:00 12:25
  USB borne attacks and usable defense mechanisms
Hardening built into the operating system without compromising on usability
Tobias Mueller, Ludovico de Nittis 12:30 12:55
  No evidence of communication and implementing a protocol: Off-the-Record protocol version 4
Version 4 of OTR protocol
SofĂ­a Celi 13:00 13:25
  RecordFlux: Facilitating the Verification of Communication Protocols Tobias Reiher 13:30 13:55
  CHIPSEC on non-UEFI Platforms
Using CHIPSEC to harden firmware against attacks & exploits
Brian Richardson 14:00 14:25
  Base64 is not encryption
A better story for Kubernetes Secrets
Seth Vargo 14:30 14:55
  What are your users kubectl-ing into your Kubernetes cluster? Julio Garcia 15:00 15:25
  Scale Your Auditing Events Philipp Krenn 15:30 15:55
  Fighting spam for fun and profit
the long road to SpamAssassin 4.0
Giovanni Bechis 16:00 16:25
  Consistent PKCS#11 in Operating Systems
improving user experience and security in RHEL and Fedora
Jakub Jelen 16:30 16:55