Loading…
Attending this event?
October 28-29, 2024 | Tokyo, Japan
View More Details & Registration
Note: The schedule is subject to change.

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for Open Source Summit + AI_dev Japan 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

This schedule is automatically displayed in Japan Standard Time (UTC +9). To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.
Intermediate clear filter
arrow_back View All Dates
Tuesday, October 29
 

11:10 JST

Desktop Linux War Stories - Anna Aitchison, Callcare
Tuesday October 29, 2024 11:10 - 11:50 JST
Linux is incredibly versatile, being a major player in server, mobile and embedded systems, yet your average person can comfortably live their entire life never even seeing a desktop or laptop running Linux. It's hard enough for individual users to overcome this intertia, but it's even harder for organisations. Implementing desktop Linux reaps rewards like digital sovereignty, security, cost reductions and more, but it takes you out of the cozy Windows ecosystem. This talk is an high level overview of what a corporate journey to desktop Linux can look like, the problems that have to be solved along the way, from provisioning to configuration management and most importantly why these migrations fail. It will draw on the speaker's experiences of managing a Linux Desktop estate, and from the wider community.
Speakers
avatar for Anna Aitchison

Anna Aitchison

Senior DevOps Engineer, Callcare
Anna is a Senior DevOps Engineer at the British callcentre outsourcer Callcare, working with their Kubernetes private cloud and Linux infra as well as supporting their introduction of AWS into the estate. She is an experienced and passionate speaker, having given 15+ talks, at events... Read More →
Tuesday October 29, 2024 11:10 - 11:50 JST
Hall A (4)

12:00 JST

Exploring Pillars of Trustworthy AI: Robustness and Fairness - Niharika Shrivastava, Workforce Optimizer
Tuesday October 29, 2024 12:00 - 12:40 JST
Due to the ever-increasing adoption of AI into the lives of daily users, trustworthy AI is of utmost priority. Even though advocates of AI globally have started talking about ethical considerations during ML model building, in reality, very few people know how to create robust, privacy-preserving, and fair AI models. In this talk, I'll explore 2 concrete technical concepts of trustworthy AI, namely ensuring robustness and fairness in ML models. Robustness: 1. Attendees will go through an in-depth understanding of critical vulnerabilities of common AI models and how to exploit them to adversarially attack the model (e.g., inference attacks, data poisoning). 2. This will be followed by simple defence strategies to increase robustness (e.g., gradient obfuscation, transformations). 3. This will be further followed by adaptive attacks on previous defence strategies thereby motivating the concept of certified robustness of AI models. Fairness: 1. Attendees will get to know how they can unconsciously encode bias (representational bias, model bias, etc) during training AI models. 2. This is followed by strategies to correct this bias using domain knowledge to create fair AI models.
Speakers
avatar for Niharika Shrivastava

Niharika Shrivastava

Data Scientist, Workforce Optimizer
Niharika's current interests lie in NLP and Applied Data Science. She holds a Master's in AI from the National University of Singapore. She was also an Outreachy fellow for The Fedora Project and has been the recipient of multiple awards such as the Red Hat Women in Open Source Award... Read More →
Tuesday October 29, 2024 12:00 - 12:40 JST
Hall B (4)

12:00 JST

Analyzing Your System with Tracing Libraries - Steven Rostedt, Google
Tuesday October 29, 2024 12:00 - 12:40 JST
trace-cmd is a front end tool to the tracefs infrastructure as well as ftrace (the mechanism that supplies function tracing). But like all tools, it's limited in what it can provide by the interface it has. Luckily, the guts of trace-cmd is being extracted into libraries. The libtracefs library is an interface to facilitate any application to access the tracefs kernel interface. This makes it easy for applications enable tracing of various events with various filters. Then there's the libtracecmd library that can be used for creating and reading the trace.dat file (the file that trace-cmd creates). By using this library, you can enable tracing on a system and then do offline analysis. Finally, there's a new library called libtraceeval that is used to help keep track of the interactions of various trace events. This talk will show some simple tools that utilize these libraries (for example, a tool that shows how much tasks are sleeping, blocked, running, and preempted). And also show i bit of the interface of the libraries to demonstrate how simple they really are.
Speakers
avatar for Steven Rostedt

Steven Rostedt

Software Engineer, Google
Steven Rostedt currently works for Google on their ChromeOS team. Steven is the main developer and maintainer of ftrace, the official tracer of the Linux kernel, as well as the user space tools trace-cmd, the ftrace tracing libraries and co-maintainer of KernelShark. Steven is one... Read More →
Tuesday October 29, 2024 12:00 - 12:40 JST
Hall A (4)

12:00 JST

Trials and Tribulations of Updating Dependencies for Vulnerability Remediation - Xueqin Cui & Michael Kedar, Google
Tuesday October 29, 2024 12:00 - 12:40 JST
Developers are often faced with an overwhelming number of vulnerabilities reported against their dependencies. The best way to deal with this is to keep all dependencies up to date, however, this is not possible for everyone. There is a lot of work to get all dependencies up to date for older projects, or to figure out what dependencies and versions to update in response to vulnerabilities. The open source OSV project built a feature called “guided remediation” to automatically update dependencies while minimising breakages. Upgrades with greater number of vulnerabilities fixed at once are prioritised. Mechanisms such as vulnerability dependency depth are also developed to further help prioritise the work. While developing these functionality to tackle these problems, we discovered that this is not as easy as it sounds. There are complexities in every step of the whole process - from scanning project files, to resolving dependencies in ecosystems with complicated rules, to determining possible updates, to writing back to the files. This talk explores the many challenges faced within npm and Maven, their complicated rules, and potential solutions for wider ecosystem support.
Speakers
avatar for Xueqin Cui

Xueqin Cui

Software Engineer, Google
Xueqin is a Software Engineer working on Google's Open Source Security team.
avatar for Michael Kedar

Michael Kedar

Software Engineer, Google
Michael is a Software Engineer working on Google's Open Source Security Team.
Tuesday October 29, 2024 12:00 - 12:40 JST
Main Hall

14:00 JST

Careless Use of Memory-Backed Ephemeral Disks in Kubernetes Can Result in Node Crashes - Shu Muto, NEC Solution Innovators, Ltd.
Tuesday October 29, 2024 14:00 - 14:40 JST
Modern applications increasingly require the output of large files such as videos and images, and the generation of more comprehensive logs. As a result, the use of RAM disks - ephemeral disks backed by memory, which are faster than traditional HDDs and SSDs - has become more common. In Kubernetes, RAM disks can be utilized through the abstraction of memory-backed emptyDir, which is based on tmpfs. However, if used carelessly, memory-backed emptyDir can pose significant risks to the stability of the Kubernetes cluster. When used as storage, the use case differs from typical memory usage by applications. Sharing files between different applications can obscure the responsibility for file garbage collection, increasing the risk of files not being deleted. If tmpfs usage excessively consumes node memory, the application containers using this tmpfs may be killed. In some cases, the deletion of tmpfs might not be timely, leading to memory exhaustion and potentially causing node crashes. This talk will share risk mitigation strategies for node crashes from the perspectives of cluster administrators, namespace administrators, and application developers.
Speakers
avatar for Shu Muto

Shu Muto

Open Source Strategy Professional, NEC Solution Innovators, Ltd.
Shu Muto is a maintainer for the Kubernetes Dashboard since Autumn 2019 and a chair for SIG UI. Previously, he contributed to the OpenStack Dashboard and its plugins as a core developer from 2015. Shu also develops WebRTC applications. He organizes Kubernetes Upstream Training Japan... Read More →
Tuesday October 29, 2024 14:00 - 14:40 JST
Hall A (3)

14:00 JST

Dynamic Scaling of GPUs for Container Apps with Composable Disaggregated Infrastructure for AI Era - Jin Hase & Lei Zhang, Fsas Technologies Inc.
Tuesday October 29, 2024 14:00 - 14:40 JST
As AI and ML become popular in container (K8s) environment, enormous computational resources are required more and more. On the other hand, efforts toward energy efficiency are also required for the realization of a sustainable society. It is expected to achieve the conflicting requirements that providing higher performance and reducing power consumption simultaneously. Recently, a new server architecture called Composable Disaggregated Infrastructure (CDI) is emerged. CDI can provide custom made servers by composing devices such as compute, memory, storage and GPU connected to PCIe or CXL switch fabric as a resource pool on demand. CDI can provide appropriate type and number of devices on demand depending on container workloads, therefore it would be a solution for this requirement. However, there is currently no standard way to control CDI from K8s. In this talk, we show how K8s and CDI could be a solution. We provide CDI operator and its Custom Resource Definition. Also, we introduce advanced vertical and horizontal cluster auto scaler for CDI. We demonstrate how K8s dynamically attach or detach devices to nodes combined with Dynamic Resource Allocation (DRA) function.
Speakers
avatar for Jin Hase

Jin Hase

Manager, Fsas Technologies Inc.
Jin Hase has been tuning the performance of servers and operating systems, designing and building systems for K8s. In recent years he has led the OSS development teams for K8s and Linux. For a new architecture called Composable Disaggregate Infrastructure, he tries to establish how... Read More →
avatar for Lei Zhang

Lei Zhang

Engineer, Fsas Technologies Inc.
Lei Zhang is an engineer at Fsas Technologies Inc. Core Product Business Unit., where he is involved with system software development for high performance computing. He has been participated in the development of the Fugaku supercomputer, Japan’s latest flagship supercomputer. For... Read More →
Tuesday October 29, 2024 14:00 - 14:40 JST
Hall A (2)

14:00 JST

Lessons Learned on Following Security Best Practices in Zephyr - Kate Stewart, The Linux Foundation
Tuesday October 29, 2024 14:00 - 14:40 JST
When the Zephyr project(https://zephyrproject.org/) launched in 2016, the lack of standardized security best practices in the IoT market segment was a known problem. It was one of the goals the project wanted to address, and started working on from before day 1. This talk will go through the journey of the last 8 years of applying known best security practices to an open source project, including becoming a CVE Numbering Authority, and forming a PSIRT team from volunteers from different companies. This team has been managing embargo windows, bulk vulnerability reports as well as the occasional vulnerability reported from the community. It is possible for open source projects to follow Security Best Practices and this talk will let others leverage the key lessons that Zephyr has learned over time.
Speakers
avatar for Kate Stewart

Kate Stewart

VP Dependable Embedded Systems, Linux Foundation
Kate Stewart works with the safety, security and license compliance communities to advance the adoption of best practices into embedded open source projects. Since joining The Linux Foundation, she has launched the ELISA and Zephyr Projects, as well as supporting other embedded projects... Read More →
Tuesday October 29, 2024 14:00 - 14:40 JST
Meeting Room 1

14:00 JST

The Year in Open Source Security - Marta Rybczynska, Ygreky
Tuesday October 29, 2024 14:00 - 14:40 JST
This year, we have seen several events related to Open Source security. Marta will inventory the main events and show us what we have learned. - The xz backdoor scandal shed light on sole maintainers and the risks to their projects yet again. - The Linux kernel and several other projects have become CVE Numbering Authorities (CNAs). At the same time, the National Vulnerability Database (NVD) database is facing difficulties. - The SBOM generation is rising, and people are discussing how to actually use that generated data. And SPDX3 has been released. - The European mandatory cyber security regulation Cyber Resilience Act is reaching completion, with similar laws showing up around the world - Without forgetting a list of vulnerabilities, exploited or not
Speakers
avatar for Marta Rybczynska

Marta Rybczynska

Founder, Ygreky
Marta Rybczynska has a network security background, with 20 years of experience in Open Source. She has worked with embedded operating systems like Linux and various real-time OSes, and with system libraries and frameworks up to user interfaces. She has been involved in various Open... Read More →
Tuesday October 29, 2024 14:00 - 14:40 JST
Hall A (4)

14:50 JST

Bringing AI on-Device: From Cloud to Edge - Catalin Vasile, Adobe
Tuesday October 29, 2024 14:50 - 15:30 JST
Step into the future of AI as we break free from the constraints of cloud-based processing and unlock the immense potential of edge computing. This cutting-edge talk explores the revolutionary shift of AI from centralized data centers to the devices in your pocket, on your wrist, and all around you. Discover how this paradigm shift is not just changing the game – it's rewriting the rules. We'll journey through the landscape of on-device AI, revealing how it's transforming user experiences, supercharging privacy, and pushing the boundaries of what's possible in real-time applications. From smart homes to autonomous vehicles, from augmented reality to personalized healthcare – learn how on-device AI is the key to unlocking a world of intelligent, responsive, and secure applications.
Speakers
avatar for Catalin Vasile

Catalin Vasile

Senior Computer Scientist, Adobe
Catalin is a Senior Computer Scientist at Adobe, surfing the clouds in the world of distributed systems and managing resilient high-scale solutions as part of the Cloud Platform team.
Tuesday October 29, 2024 14:50 - 15:30 JST
Hall B (4)

14:50 JST

AGL VSS Proxy and Gateway Demo Walkthrough - Scott Murray, Konsulko Group
Tuesday October 29, 2024 14:50 - 15:30 JST
The AGL vehicle to cloud (V2C) expert group has been working for the past year towards the creation of a Vehicle Signal Specification (VSS) to MQTT proxy. This presentation will walk through the architecture and features of the new agl-vss-proxy daemon, as well its integration into the gateway demo that was shown at Embedded World 2024.
Speakers
avatar for Scott Murray

Scott Murray

Principal Software Engineer, Konsulko Group
Scott has been a Linux user for almost 30 years, and has developed Linux based embedded products for almost 25 years at a variety of companies large and small. Currently, he works for Konsulko Group as a Principal Software Engineer, providing embedded Linux engineering services for... Read More →
Tuesday October 29, 2024 14:50 - 15:30 JST
Hall B (3)

15:50 JST

Data Contracts Are Good for AI - Jean-Georges Perrin, Bitol / AbeaData
Tuesday October 29, 2024 15:50 - 16:30 JST
Bitol is one of the newest LF AI & Data projects focusing on open standards and open source tools for modern data engineering. Bitol's flagship standard is ODCS (Open Data Contract Standard). In this talk, as the chair of the Bitol TSC, I will first explain what a data contract is, the work of the Bitol project, and focus on the benefits of data contracts for AI & analytics. I will conclude with an end-to-end demo of creating and enforcing data contracts using open-source and free tools.
Speakers
avatar for Jean-Georges Perrin

Jean-Georges Perrin

Chair of the TSC / Chied Innovation Officer, Bitol / AbeaData
Jean-Georges “jgp” Perrin is CIO at AbeaData, focusing on building innovative and modern data tooling. He is also chair of the Bitol project at the Linux Foundation, a Lifetime IBM Champion, and author of multiple books, including Implementing Data Mesh (O’Reilly) and Spark... Read More →
Tuesday October 29, 2024 15:50 - 16:30 JST
Hall B (4)

15:50 JST

Meeting Software License Compliance Policies During the Inbound Process: A Practical Approach - Julian Coccia, SCANOSS
Tuesday October 29, 2024 15:50 - 16:30 JST
Some of the most common license compliance policies violations in automotive are related to specific black listed OSS licenses. Ideally, code under such licenses should be detected during the inbound process. Commercial SCA solutions are the default option in automotive to address this challenge. We need solutions that can be shared in both, commercial environments and in the open. This tutorial will demonstrate how any organization can build their own knowledge base linked to a specific license compliance policy, such as preventing GPLv3 code from landing onto an in-vehicle platform. Julián will also show how to create license scanning and detection mechanisms against such ad-hoc knowledge base during the inbound process, using OSS only. It will also provide solutions on how companies in the automotive supply chain, including open-source organizations, can share and audit the results using this common toolkit and knowledge base. Additionally, the talk will illustrate how this approach can be generalized for broader use cases, with limited usage intensity, using the OSS KB, from the Software Transparency Foundation. OSS KB: https://www.softwaretransparency.org/osskb
Speakers
avatar for Julian Coccia

Julian Coccia

CTO, SCANOSS
Passionate about Open Source license compliance. Developed global Open Source processes and tools at Ericsson. Co-founded and developed the core technology at FOSSID. Driving the Project Office at the Software Transparency Foundation to drive SBOM adoption. Leading the technology... Read More →
Tuesday October 29, 2024 15:50 - 16:30 JST
Hall B (3)

15:50 JST

Security for AI and Multi-Party Collaboration with Confidential Computing (Oh, and Web3!) - Mike Bursell, Confidential Computing Consortium
Tuesday October 29, 2024 15:50 - 16:30 JST
Confidential Computing has been around for a while, and is now widely available from most hyperscalers and CSPs, but over the past year, two use cases have raised its visibility enormously: Confidential AI and Secure Multi-party Collaboration. Both of these require the confidentiality and integrity that Confidential Computing provides, but the addition of another property - cryptographic attestation - allows trust in these workloads and their inputs and outputs - to be established in ways that increase their value significantly. Learn about the technology underpinning these developments, how organisations are creating new business models, and how the Confidential Computing Consortium is promoting open source in this area.
Speakers
avatar for Mike Bursell

Mike Bursell

Executive Director, Confidential Computing Consortium
Mike Bursell is the Executive Director of the Confidential Computing Consortium. He is one of the co-founders of the Enarx project. He has previously served on the Governing Boards of the CCC and the Bytecode Alliance and currently holds advisory board roles with various start-ups... Read More →
Tuesday October 29, 2024 15:50 - 16:30 JST
Hall A (3)

15:50 JST

Build a Container Image from Scratch - Danish Prakash, SUSE
Tuesday October 29, 2024 15:50 - 16:30 JST
Container images are ubiquitous nowadays, you've probably used them in one way or another or might have even built one of them. But how are they constructed? What's inside of one? This talk goes through the process of manually creating a Container image without using tools such as docker. Along the way, we'll cover essential components such as layers, metadata, and configuration options that make up an image, and use them to assemble our final Container image. We'll also load it into Docker and run it! By guiding you through the step-by-step assembly of a Docker image, this talk aims to demystify Docker images and strengthen your understanding of their inner workings.
Speakers
avatar for Danish Prakash

Danish Prakash

Container Engine Engineer, SUSE
Danish Prakash is a Container Engine Engineer at SUSE. He is a contributor to upstream projects such as Podman, Buildah, nerdctl, etc, and is the downstream maintainer of these packages for SUSE Linux products.
Tuesday October 29, 2024 15:50 - 16:30 JST
Hall A (2)

15:50 JST

Secure and Efficient Sensing Applications with Wasm: Sony's Edge Virtualization Platform (EVP) - Dan Mihai Dumitriu, Midokura (Sony Group)
Tuesday October 29, 2024 15:50 - 16:30 JST
In this talk, we will introduce Sony's Edge Virtualization Platform (EVP), a cutting-edge solution that leverages WebAssembly (Wasm) at the edge to ensure the security and safety of sensing applications. The EVP addresses key challenges in the embedded IoT landscape, including resource constraints, cybersecurity, and lifecycle management. Our discussion will cover: WebAssembly at the Edge: How Wasm enhances security and performance for sensing applications. Edge App SDK: A powerful toolkit for developers to create, manage, and deploy edge applications within a Wasm sandbox, ensuring compatibility and efficiency across diverse hardware. Device and Lifecycle Management: Techniques for efficient device management and application lifecycle management within the EVP. By the time of the Open Source Summit Japan, all these components will be open-sourced, aligning with Sony's upstream strategy to foster collaboration and innovation in the IoT community.
Speakers
avatar for Dan Mihai Dumitriu

Dan Mihai Dumitriu

Cto, Midokura
Dan Mihai Dumitriu is CTO of Midokura, a Sony Group company, leading an R&D team for advanced development of edge computing and AI technologies. He has deep technical insight into complex distributed systems, data center networks, and software architecture. Earlier in his career Dan... Read More →
Tuesday October 29, 2024 15:50 - 16:30 JST
Meeting Room 1

16:40 JST

From Complexity to Clarity: Addressing Challenges in AI BOMs for Compliance - Gopi Krishnan Rajbahadur, Huawei Technologies Canada & Kate Stewart, The Linux Foundation
Tuesday October 29, 2024 16:40 - 17:20 JST
As global regulations on AI software tighten, developers face a complex set of new, ambiguous rules. The AI Software Bill of Materials (AI BOM), especially the new SPDX 3.0 with AI and dataset profiles, offers a promising solution for compliance, providing detailed, machine-readable documentation of AI systems. Despite its benefits, adoption has been slow, hindered by gaps in developer knowledge and the complex nature of AI systems. Many AI BOMs are incomplete or inaccurate, limiting their utility for compliance. Our talk will tackle these issues, drawing on our experience with SPDX 3.0 and AI BOM implementation. We'll share best practices and strategies to improve AI BOM accuracy and utility, equipping professionals with the insights to ensure their AI applications are compliant and prepared for future regulations.
Speakers
avatar for Gopi Krishnan Rajbahadur

Gopi Krishnan Rajbahadur

Senior Staff Researcher, Huawei Technologies Canada
Gopi Krishnan Rajbahadur is a Senior Staff Researcher at Huawei's Centre for Software Excellence in Canada. He is currently working on SE for Large Language Models and the governance of AI datasets. He is the co-lead for the AI and datasets profile in the ISO/IEC 5692 SPDX standard... Read More →
avatar for Kate Stewart

Kate Stewart

VP Dependable Embedded Systems, Linux Foundation
Kate Stewart works with the safety, security and license compliance communities to advance the adoption of best practices into embedded open source projects. Since joining The Linux Foundation, she has launched the ELISA and Zephyr Projects, as well as supporting other embedded projects... Read More →
Tuesday October 29, 2024 16:40 - 17:20 JST
Hall B (4)

16:40 JST

The Emulation of AD Sensors in IVI Domain Over PCI Express (Ghost Device) - Kim Rain Woosung & Dongwoo Han, LG Electronics Inc.
Tuesday October 29, 2024 16:40 - 17:20 JST
[ How to extend AD Sensors to IVI Domain ] 1. Why we extend AD sensors to IVI Domain Can you image that AD sensors can be safely and securely used for IVI Domain, as well as Autonomous Driving ? 2. 3rd party eco system on AD Vehicle AD vehicle has more sensors then the one of smartphone, using them, we can create the more rich application in AD vehicle. 3. E/E Architecture and HPC for the future The communication between SoCs in HPC needs to have very high performance bus, and, now PCI Express is the best candidate. 4. Sensor Sharing and Functional Safety Ghost Device cannot control the physical sensor directly. So, basically there is no way for the cracker to make the high-level Security System harmful. 5. The concept of Ghost Device When numbers of SoC are weaved, a SoC needs to deal with another SoC as a kind of peripheral, because SoC is generally designed as a host of whole system. So, we need to define another SoC as a kind of peripheral, or abstract and emulate data from another SoC as one from peripherals. 6. How to implement it Using ntb_transport, NTRDMA, and ,Infiniband core, Ghost Device is implemented. 7. The example, Camera Sensor (demonstration is ready)
Speakers
avatar for Dongwoo Han

Dongwoo Han

Researcher, LG Electronics Inc.
over 20 years, I has been system s/w engineer. Now, I'm working as IVI developer for LGE.
avatar for Woosung Kim

Woosung Kim

Task Leader, CTO div., LG Electronics
Software architect and task lead of the automotive high-performance computing and consolidation system at the vehicle onboard. Also digital twin and orchestration by cloud and multi-application processor on off-board. Currently, active at advanced technical PoC with SoC vendors and... Read More →
Tuesday October 29, 2024 16:40 - 17:20 JST
Hall B (3)

16:40 JST

Kubernetes WG-LTS: Why We Need LTS? - Yuiko Mori, NEC Corporation
Tuesday October 29, 2024 16:40 - 17:20 JST
Today, many companies are using Kubernetes in production environments, but there are various challenges in commercial use. One of the challenges is managing the Kubernetes cluster. Many companies are facing challenges related to Kubernetes version upgrades. According to a 2022 survey, most host systems run Kubernetes versions that are 18 months or more out of support. In this situation, the Kubernetes community launched the WG-LTS (Long Term Support Working Group) to promote Kubernetes LTS (Long Term Support). In this session, I will introduce the background, purpose, and activities of the WG-LTS. I will also explain why as a System Integrator, NEC needs Kubernetes LTS. On the other hand, (This is not just in case of Kubernetes, but) there is gap between community developers and users in open source community. I will discuss such gap also. I will also discuss the barriers(human resources, cost, etc…) to advancing LTS in Kubernetes community.
Speakers
avatar for Yuiko Mori

Yuiko Mori

Manager, NEC
Yuiko Mori is a software engineer at NEC Solution Innovators, Ltd. on a wide range of software projects, and developing open source software. She's been an active technical contributor to Kubernetes, and also previously she had worked for OpenStack.
Tuesday October 29, 2024 16:40 - 17:20 JST
Hall A (2)

16:40 JST

Device Management and Delta Update for Embedded Devices with SWUpdate and TUF - Koshiro Onuki, Toshiba Corporation
Tuesday October 29, 2024 16:40 - 17:20 JST
Secure and efficient software updates are crucial in infrastructure. Our research integrates SWUpdate with The Update Framework (TUF), which enhances security by ensuring update integrity and improving resistance to well-known attacks. However, there are challenges in the TUF verification process for embedded devices. It requires downloading the entire target images and verifying its size and hash values. This process may be difficult to execute on devices with limited resources. Therefore, we have developed a device management function that manages unique information such as device version information, in addition to integrating with TUF. This function enables the generation of delta update images considering the target device information. As a result, it is believed that updates can be made even within limited resources by transmitting only delta. Furthermore, it becomes possible to meet specific needs of each device, such as reducing bandwidth and update time, customizing update images, and enhancing image encryption. In this presentation, we will showcase the practical implementation of our function that integrates TUF and delta update.
Speakers
avatar for Koshiro Onuki

Koshiro Onuki

Engineer, Toshiba Corporation
Koshiro Onuki has been working as a Software Engineer at TOSHIBA Corporation since 2022. His main role is to develop Linux for various industrial embedded products. He is mainly involved in research and development of software updates.
Tuesday October 29, 2024 16:40 - 17:20 JST
Meeting Room 1

16:40 JST

Real-Time Scheduling Fault Simulation - Ben Dooks, Codethink
Tuesday October 29, 2024 16:40 - 17:20 JST
There is a lot of work around how to achieve good real-time on Linux, but not as much on how to simulate faults such as jitter in the system, deadline misses or other faults. Without this it is difficult to test how your application or entire system copes with these problems. As part of work with a number of clients, especially in the safety sphere, questions have come up on how to test processes which rely on real-time scheduling. If we have a way of injecting faults we can reliably test error handling and other mitigations. Mitigations such as throttling, restarting or some measured shutdown of services. We will go through some methods we evaluated for fault injection via both user and kernel space. How existing kernel features can be used and what needs to be done in the way of either configuring or extending kernel features. There will be discussion about how each method works and the comparative merits where overlaps exist. We hope that this can help to promote thinking and improvements on how the scheduler and particularly real-time scheduling is tested under Linux.
Speakers
avatar for Ben Dooks

Ben Dooks

Senior Engineer, Codethink, Codethink
Senior open source consultant at Codethink and long-time contributor to various projects such as the Linux Kernel.
Tuesday October 29, 2024 16:40 - 17:20 JST
Hall A (4)

16:40 JST

The Telemetry of Trust, Using Attestations to Secure Your SDLC with Open Source Tools - Jesse Sanford & Jagadish Ramidi, Autodesk
Tuesday October 29, 2024 16:40 - 17:20 JST
Let’s be honest, delivering software can be a dirty business. Especially if you are in the critical path of delivering legacy software, or software born from mergers and acquisitions. How can we secure so many differences at scale? How can we build trust into everything we do so that we can delay evaluation until we have enough trust later? In this talk, Jagadish and Jesse show you how Autodesk is thinking about solving both of these problems simultaneously. Through the use of “attestations”. Simple, cryptographically verifiable bits of telemetry that when combined, equal a whole lot more than the sum of their parts. Get enough of them and they build a story of trust. By weaving a software lifecycle tale through a series of verifiable inputs, actions and outcomes we can decide for example, when to allow a build be deployed. Or better, decide when it’s to be deployed to a secure and compliant location. Autodesk is starting to tell those software lifecycle stories using open source software weaved into our platform, making the software we build safer for all, despite our diversity.
Speakers
avatar for Jagadish Ramidi

Jagadish Ramidi

Software Engineer, Autodesk
Works as a security software engineer at Autodesk focusing on software composition analysis and supply chain security.
avatar for Jesse Sanford

Jesse Sanford

Software Architect, Autodesk
Jesse is a lifelong software engineer focused on site reliability and Infosec. Currently architecting the juncture of platform engineering and security/compliance for Autodesk's Developer Enablement team. He regularly contributes to open source and frequently speaks about his work... Read More →
Tuesday October 29, 2024 16:40 - 17:20 JST
Main Hall
 
  • Filter By Date
  • Filter By Venue
  • Filter By Type
  • Audience
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.
Filtered by Date -