Brussels / 1 & 2 February 2025

schedule

UB4.132


Day Start End Track(s)
Saturday 10:30 19:00 Security
Sunday 09:00 17:00 Virtualization and Cloud Infrastructure
09 10 11 12 13 14 15 16 17 18
Saturday Syd: An Introduction to Secure Application Sandboxing for Linux
Tightening every bolt
Kintsugi: A Decentralized E2EE Key Recovery Protocol
Nothing to see here - practical advice to avoid tunnel vision and similar decloaking techniques against VPNs
The SELinux problem that cast a months long shadow
A Practical Introduction to using sq, Sequoia PGP's CLI
Using DPoP to use access tokens securely in your Single Page Applications
Breaking Barriers: The Art of (Free) Gamified Security Training
TKey, an open source/open hardware security token
Hardware backed SSH keys: ssh-tpm-agent
Sigsum: Detecting rogue signatures through transparency
An overview on detecting Login Anomalies with BuffaLogs
Managing Vulnerabilities in Open-Source Dependencies
What if Log4Shell were to happen today?
How Threat Actors Are Weaponizing Your Favorite Open-Source Package Registry
Hunting for GitHub Actions bugs with zizmor
Enhancing artifact security with GitHub Artifact Attestations
Sunday Introducing FUKI, guest firmware in a UKI for confidential cloud deployments
Confidential VMs on public clouds and on-premise: a long way towards zero trust
Hunting Virtio Specification Violations
Migrating from VMware to Kubernetes
Can QEMU and vhost-user devices be used on macOS and *BSD?
The IaC Tooling Multiverse and the Future of IaC
Enhancing KubeVirt workload scheduling patterns (controversial)
A Highly Distributed Cloud Architecture for Telco NFV Deployments
Simplifying KubeVirt: New tools for easier VM management
Free my Kubernetes network! Breaking away from the Kubernetes networking model
Portability and Interoperability across a Pan-European Virtualized Cloud-Edge Continuum
Unlocking the Hybrid Cloud: An Open Source Approach
Running QEMU Inside Browser
Building AI Factories with Open Source Tools
Enabling AMD SEV technology in Xen Hypervisor.
On-Prem Kubernetes at Scale With metal-stack.io

Events

Title Speakers Track Start End

Saturday

  Syd: An Introduction to Secure Application Sandboxing for Linux
Ali Polatel Security 10:30 11:00
  Tightening every bolt
Daniel Stenberg Security 11:00 11:30
  Kintsugi: A Decentralized E2EE Key Recovery Protocol
Emilie Ma Security 11:30 12:00
  Nothing to see here - practical advice to avoid tunnel vision and similar decloaking techniques against VPNs
Till Maas Security 12:00 12:30
  The SELinux problem that cast a months long shadow
Matyas Horky Security 12:30 13:00
  A Practical Introduction to using sq, Sequoia PGP's CLI
Neal H. Walfield Security 13:00 13:30
  Using DPoP to use access tokens securely in your Single Page Applications
Alexander Schwartz, Takashi Norimatsu Security 13:30 14:00
  Breaking Barriers: The Art of (Free) Gamified Security Training
Joseph Katsioloudes Security 14:00 14:30
  TKey, an open source/open hardware security token
Michael Cardell Widerkrantz Security 14:30 15:00
  Hardware backed SSH keys: ssh-tpm-agent
Morten Linderud Security 15:00 15:30
  Sigsum: Detecting rogue signatures through transparency
Niels Möller Security 15:30 16:00
  An overview on detecting Login Anomalies with BuffaLogs
Federico Foschini, Lorena Goldoni Security 16:00 16:30
  Managing Vulnerabilities in Open-Source Dependencies
Eva Sarafianou Security 16:30 17:00
  What if Log4Shell were to happen today?
Piotr P. Karwasz Security 17:00 17:30
  How Threat Actors Are Weaponizing Your Favorite Open-Source Package Registry
Ian Kretz, Sebastián Obregoso Security 17:30 18:00
  Hunting for GitHub Actions bugs with zizmor
William Woodruff Security 18:00 18:30
  Enhancing artifact security with GitHub Artifact Attestations
Fredrik Skogman Security 18:30 19:00

Sunday

  Introducing FUKI, guest firmware in a UKI for confidential cloud deployments
Anirban (Ani) Sinha Virtualization and Cloud Infrastructure 09:00 09:30
  Confidential VMs on public clouds and on-premise: a long way towards zero trust
Vitaly Kuznetsov Virtualization and Cloud Infrastructure 09:30 10:00
  Hunting Virtio Specification Violations
Matias Vara Larsen Virtualization and Cloud Infrastructure 10:00 10:30
  Migrating from VMware to Kubernetes
Martin Necas Virtualization and Cloud Infrastructure 10:30 11:00
  Can QEMU and vhost-user devices be used on macOS and *BSD?
Stefano Garzarella Virtualization and Cloud Infrastructure 11:00 11:30
  The IaC Tooling Multiverse and the Future of IaC
Roni Frantchi Virtualization and Cloud Infrastructure 11:30 12:00
  Enhancing KubeVirt workload scheduling patterns (controversial)
Simone Tiraboschi Virtualization and Cloud Infrastructure 12:00 12:30
  A Highly Distributed Cloud Architecture for Telco NFV Deployments
Nicolae-Madalin Neag Virtualization and Cloud Infrastructure 12:30 13:00
  Simplifying KubeVirt: New tools for easier VM management
Felix Matouschek Virtualization and Cloud Infrastructure 13:00 13:30
  Free my Kubernetes network! Breaking away from the Kubernetes networking model
Miguel Duarte, Doug Smith Virtualization and Cloud Infrastructure 13:30 14:00
  Portability and Interoperability across a Pan-European Virtualized Cloud-Edge Continuum
Jordi Guijarro Virtualization and Cloud Infrastructure 14:00 14:30
  Unlocking the Hybrid Cloud: An Open Source Approach
Victor Palma Virtualization and Cloud Infrastructure 14:30 15:00
  Running QEMU Inside Browser
Kohei Tokunaga Virtualization and Cloud Infrastructure 15:00 15:30
  Building AI Factories with Open Source Tools
Pablo del Arco Virtualization and Cloud Infrastructure 15:30 16:00
  Enabling AMD SEV technology in Xen Hypervisor.
Andrei Semenov Virtualization and Cloud Infrastructure 16:00 16:30
  On-Prem Kubernetes at Scale With metal-stack.io
Stefan Majer, Gerrit Schwerthelm Virtualization and Cloud Infrastructure 16:30 17:00