Skip to content

FOSS presentation abstracts, slides, etc, in reStructuredText and other formats

License

Notifications You must be signed in to change notification settings

VCTLabs/foss-rst-presentations

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

83 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

FOSS Presentations and Abstracts

A repo for FOSS presentations in reStructuredText; see the prebuilt directory for PDFs or other binary output, and the source directories for source files.

Current presentations include FOSS instrumentation & drone platforms, as well as security hardening from the kernel up; a small subset of the features described in the Hardened presentation are now available in the mainline kernel.

Towards an Open Instrumentation Platform: Getting the Most From MAVLink, ArduPilot, and BeagleBone ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Abstract

What is a drone? What is an autopilot, and just what is an IMU and a Kalman filter? This presentation describes an open source hardware and software architecture defined by the Ardupilot firmware, the MAVLink message protocol, several layers of user-space software, and various supported hardware devices and peripherals. It will also cover the current capabilities and components of the core software stacks, as well as extended support for different hardware platforms and sensors, computer vision processing, cameras and image tags, as well as specific science applications and related FOSS projects currently underway. The two highlighted projects both suggest more non-traditional (and less mobile) data acquisition applications using these tools; for more typical UAV applications, airframe options and alternative firmware will also be discussed.

Slides

prebuilt/open_source_drones.pdf

foss-instrumentation/open_source_drones.rst

Squash Those IoT Security Bugs with a Hardened System Profile

Short Abstract

Although the tools and documentation have been around a long time, the industry as a whole has been woefully slow at taking security engineering seriously (even more so in the embedded world). The current mainline kernel includes several access control systems that reduce the risk of bugs escalating into high-level security compromises, such as the venerable SELinux (which is enabled by default in Android 4.4 and several "enterprise" Linux distributions). This presentation focuses on a complementary set of security mechanisms that work independently from the overlying frameworks: PIE toolchain hardening, PAX kernel hardening, and the PAX userland tools. These technologies work together to demote whole classes of bugs from headline-grabbing remote compromise and/or data theft exploits to "mere" DoS annoyances.

Long Abstract

Security engineers have long been pushing the idea of multiple layers of defense and countermeasures, offering very well documented processes and tools for this effort. Sadly, the software industry as a whole has long been failing to heed this advice, leading to serious breaches with theft of sensitive data. We embedded Linux developers need to step up our security game to keep today's new and bleeding-edge products from becoming tomorrow's security headlines!

The current mainline kernel includes several access control systems that reduce the risk of bugs escalating into high-level security compromises, such as the venerable SELinux (which is even enabled by default in Android 4.4 and later). This presentation focuses on a complementary set of security mechanisms: PIE toolchain hardening, PAX kernel hardening, and the PAX userland tools. These technologies work together to demote whole classes of bugs from headline-grabbing remote compromise and/or data theft exploits to "mere" DOS annoyances.

Audience

The audience for this is very broad, from developers and devops, to system admins and integrators, as well as distribution/package maintainers and power users. Attendees will learn the hows and whys of PAX, PIE, and SSP kernel/toolchain hardening as part of a comprehensive layered security implementation.

Benefits to the Ecosystem

This presentation will help existing and new engineers, system administrators, and technical managers better understand the scope of Linux security tools/frameworks and why a hardened baseline system profile is a critical piece of the overall puzzle. It will also hopefully encourage them, and the companies that they work for, to take a more comprehensive approach to system hardening and start shipping more resilient products.

Speaker Bio

(Steve Arnold) Principal Scientist at VCT Labs, and also an open source developer and mentor (Gentoo / OE / BeagleBoard.org), a contract engineering consultant, science geek, and maker/hacker. Previous speaker/volunteer at GSoC, AMS, JANNAF IPC, SCaLE, and ELC (https://github.com/VCTLabs). Gentoo and OpenEmbedded work (https://github.com/gentoo/arm https://github.com/sarnold) plus upstream software maintenance. "We make the core stuff work so others can build on it..."

Slides

prebuilt/hardened_system_profile.pdf

hardened/hardened_system_profile.rst

Note

To build graphics and slides from source requires recent versions of the following dependencies:

  • media-gfx/graphviz
  • dev-python/rst2pdf
  • dev-python/docutils
  • sys-devel/make

About

FOSS presentation abstracts, slides, etc, in reStructuredText and other formats

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published