Aljoscha Lautenbach
Hardening Linux for Embedded Systems
Status: Available NowWith increasing regulatory requirements on cybersecurity around the world, it is more important than ever to secure the systems you develop. As Linux is an integral part of many embedded systems, we will address how to harden Linux systems, in other words, how to reduce their attack surface by applying appropriate configurations. Linux hardening is a vast topic, so we will give a high-level overview of the topic, and then dive deeper into a few chosen topics.
Among other things, you will learn the following:
- What is hardening and when is a system sufficiently "hardened"
- How to weigh trade-offs between security and performance of certain kernel configurations
- Which Linux Security Modules (LSMs) exist, and which are most useful for embedded use cases
- How to configure a standard firewall with nftables
- How to configure SSH for maintenance & diagnostics
- Which tools can help you with the hardening process
Live Q&A - Hardening Linux for Embedded Systems
Status: Available NowLive Q&A with Aljoscha Lautenbach for the talk titled Hardening Linux for Embedded Systems
Common cryptography mistakes for software engineers (2020)
Status: Available NowMost implementations of security mechanisms depend on cryptography, and yet, many vulnerabilities exist because cryptography is used incorrectly. This is partly due to lacking user-friendliness of cryptographic library API designs [1][2], and partly due to a lack of education in the developer community of the underlying mechanisms. As for the API design, we can only lobby for more user-focused design during library development and advocate user-friendly libraries. We can, however, try to improve the communal understanding of how to use cryptography securely. By way of examples, this talk will explore questions such as: What is an IV and why does it matter? Why does entropy matter? Which cipher mode is appropriate for my application? In essence, we highlight points to watch out for when implementing security mechanisms using cryptography.
[1] https://www.cl.cam.ac.uk/~
[2] http://mattsmith.de/pdfs/