Loading…
Attending this event?
November 12, 2024 | Salt Lake City, Utah
Learn More and Register to Attend

The Sched app allows you to build your schedule but is not a substitute for your event registration. You must be registered for SigstoreCon Supply Chain Day 2024 to participate in the sessions. If you have not registered but would like to join us, please go to the event registration page to purchase a registration.

Please note: This schedule is automatically displayed in Mountain Standard Time. To see the schedule in your preferred timezone, please select from the drop-down located at the bottom of the menu to the right.

The schedule is subject to change.
Tuesday, November 12
 

8:00am MST

Registration + Badge Pick-up
Tuesday November 12, 2024 8:00am - 6:00pm MST
Tuesday November 12, 2024 8:00am - 6:00pm MST
Alpine Foyer

9:00am MST

Keynote: Welcome & Opening Remarks - Speaker To Be Announced
Tuesday November 12, 2024 9:00am - 9:05am MST
Tuesday November 12, 2024 9:00am - 9:05am MST
Alpine

9:10am MST

Keynote: Sigstore's Future - Bob Callaway, Head of Open Source Security Team, Google
Tuesday November 12, 2024 9:10am - 9:15am MST
Speakers
avatar for Bob Callaway

Bob Callaway

Head of Google Open Source Security Team, Google
Bob is the tech lead & manager of the supply chain integrity group in Google's Open Source Security Team. He and his team directly contribute to critical OSS secure software supply chain projects (including Sigstore that he co-founded), as well as help drive adoption of best practices... Read More →
Tuesday November 12, 2024 9:10am - 9:15am MST
Alpine

9:15am MST

Keynotes To Be Announced
Tuesday November 12, 2024 9:15am - 9:35am MST
Tuesday November 12, 2024 9:15am - 9:35am MST
Alpine

9:40am MST

Trends and Ecosystem Dynamics in Sigstore - Chinenye Okafor, Purdue University
Tuesday November 12, 2024 9:40am - 10:10am MST
Sigstore has witnessed significant adoption since its launch, becoming a big player in software supply chain security. Research has primarily focused on identity verification and transparency log witnessing (i.e.,verifying log consistency). However, the semantics security (i.e., the content) of log entries remains largely unexplored. Given generic witnessing solutions are not one-size-fits-all, we analyze the dynamics of Rekor log entries to gain insights to enable better misbehavior detection and stronger identity verification. Our analysis answers these questions: * What are the trends in Sigstore adoption over time? * What are the patterns in certificates, and generated signatures? * What kinds of identities are involved in signing? * What actors are performing these signing actions?
Speakers
avatar for Chinenye Okafor

Chinenye Okafor

Research Assistant, Purdue University
Chinenye is a Ph.D. student at Purdue University’s Electrical and Computer Engineering department in the Trustworthy Software Ecosystems Lab, where she works on securing software supply chains
Tuesday November 12, 2024 9:40am - 10:10am MST
Alpine

10:15am MST

The Next 5 Years of Supply Chain Security on PyPI - William Woodruff, Trail of Bits
Tuesday November 12, 2024 10:15am - 10:45am MST
Over the last 5 years, PyPI has adopted a large number of technologies and standards aimed at improving the integrity of the Python packaging ecosystem: scoped API tokens, security events, strong MFA, Trusted Publishing, and (most recently) PEP 740 for cryptographic package attestations. This talk hypothesizes and breaks down the next 5 years of changes, ranging from immediately practical efforts to "big picture" ideas. Some ideas considered include (but are not limited to): * Index-wide binary transparency in the style of Go's sumdb, along with considerations for identity (i.e. package identity) monitoring by upstreams; * "Counter" attestations in the vein of PEP 740, enabling auditors and interested community members to cryptographically register their trust in a PyPI package; * Scalable witnessing and monitoring for PEP 740 attestations, including rollup techniques for reducing the burden of integration for pure-Python package installers like `pip`; * TOFU-style identity locking via lockfiles, including (potentially) Python's PEP 751; * Using TUF to distribute complex identity policies.
Speakers
avatar for William Woodruff

William Woodruff

Engineering Director, Trail of Bits
William Woodruff is an Engineering Director at Trail of Bits, a NYC-based consultancy. He splits his time between OSS engineering and running the Ecosystem Security group, which is responsible for contributing security and usability improvements to a wide range of OSS tools and services... Read More →
Tuesday November 12, 2024 10:15am - 10:45am MST
Alpine

10:45am MST

Break
Tuesday November 12, 2024 10:45am - 11:00am MST
Tuesday November 12, 2024 10:45am - 11:00am MST
Alpine

11:00am MST

Cosign: Keeping up with the Client Libraries - Zach Steindler, GitHub
Tuesday November 12, 2024 11:00am - 11:30am MST
2024 has been quite the year for client libraries as well as Sigstore deployments: with betas of Homebrew's build provenance, Maven Central accepting Sigstore signatures, and PyPI's publish attestation. These deployments (and the client libraries they use) store content in Sigstore protocol buffer formats: signed material in bundles and verification material in trusted roots. There's a number of advantages to using these formats, but unfortunately cosign does not default to using them. It's important for the ecosystem to be interoperable, so we're working on updating cosign to default to these formats, including commands to help folks transition from their existing usage. In this talk we'll go over what that plan looks like, what progress we've made so far, and get your feedback on what else we need to consider to help cosign keep up with the client libraries.
Speakers
avatar for Zach Steindler

Zach Steindler

Principal Engineer, GitHub
Zach is slowly learning more about gardening and welding. When he's at the keyboard he likes working on home automation, biking, and helping secure open source software. A housing inspector once called his electrical work "amateurish".
Tuesday November 12, 2024 11:00am - 11:30am MST
Alpine

11:35am MST

Rekor V2: What's Next for Sigstore's Transparency Log - Hayden Blauzvern & Colleen Murphy, Google
Tuesday November 12, 2024 11:35am - 12:05pm MST
Transparency logs are tamper-evident, immutable ledgers that provide a cryptographic commitment for inclusion of ledger entries in the log to allow the entries to be publicly auditable, forcing malicious behavior to be transparent. Rekor is Sigstore's signature transparency log, where each entry in the log provides auditability for a signed artifact. A public-good instance of Rekor is maintained by the Sigstore community and used by individuals, organizations and package registries. We've learned much since we deployed the 1.0 API for Rekor; the API is complex and inefficient for what clients really need to verify an artifact, and the maintenance burden and storage costs needed to support it are nontrivial and may deter operators from adopting Rekor. Moreover, privacy and redaction is not easily supportable in the current design. There has been active development in simplifying log deployments and minimizing operational costs in Certificate Transparency that we can apply to Rekor. In this talk, we'll discuss how we will leverage these innovations to improve Rekor's usability, simplifying the API and making Rekor deployments easier to maintain and scale.
Speakers
avatar for Hayden Blauzvern

Hayden Blauzvern

Technical Lead Manager, Google
Hayden Blauzvern is a technical lead manager on Google’s Open Source Security Team, focused on making open-source software more secure through code signing and applied transparency. Hayden is a maintainer and the community chair on the Sigstore project.
avatar for Colleen Murphy

Colleen Murphy

Software Engineer, Google
Colleen has made her career out of open source development and has been a key contributor to several major open source projects, such as OpenStack and the Kubernetes ecosystem. Her current focus is on software supply chain security and Sigstore.
Tuesday November 12, 2024 11:35am - 12:05pm MST
Alpine

12:10pm MST

The Challenges of Building a Sigstore Implementation from Scratch - Samuel Giddins, Ruby Central
Tuesday November 12, 2024 12:10pm - 12:40pm MST
Sigstore Ruby now exists. So exciting! But bringing it to life was a challenge, particularly due to the goal of being able to ship it as a part of Ruby itself. Building a sigstore implementation atop only the standard library required writing a TUF client, implementing custom x509 handling, and abstracting over all the supported key types, among other challenges. This talk will explore those challenges, and dive into _why_ a sigstore implementation proves to be such an undertaking, hopefully inspiring some simplification for the next poor soul who attempts to build one from scratch.
Speakers
avatar for Samuel Giddins

Samuel Giddins

Security Engineer in Residence, Ruby Central
Samuel is the Security Engineer in Residence at Ruby Central, leading security efforts across RubyGems and RubyGems.org by day (and sometimes by night, CVEs never sleep). He's been working on Ruby tooling for the past decade, and has shipped hundreds of bugs across RubyGems & Bun... Read More →
Tuesday November 12, 2024 12:10pm - 12:40pm MST
Alpine

12:40pm MST

Lunch Break
Tuesday November 12, 2024 12:40pm - 1:25pm MST
Tuesday November 12, 2024 12:40pm - 1:25pm MST
Alpine

1:25pm MST

Rewriting Root-Signing -- a Deep Dive Into Sigstore Trust Root Delivery - Jussi Kukkonen, Google
Tuesday November 12, 2024 1:25pm - 1:55pm MST
The Sigstore trust root is delivered to Sigstore clients via root-signing, a less known but security-critical part of Sigstore. In this talk the audience will learn how the project operates and also why it went through a significant rewrite during the past year when it switched to using tuf-on-ci as tooling. The talk will outline the best practices of trust root management and how they are now applied in the project. Topics include: * Current state of the Sigstore root-signing project * Why on earth would you rewrite working critical infrastructure? There are multiple incompatibility incidents in the history of root-signing: the talk will show how a rewrite can be a sensible choice in this situation * Design discussion – why is root-signing such a strange little project? Turns out the combination of user collaboration in a community project with hardware backed signing requires a unique solution * What is next for root-signing?
Speakers
avatar for Jussi Kukkonen

Jussi Kukkonen

Open source supply chain security @ Google, Google
Jussi secures Open Source supply chains at Google. He has extensive Open Source experience and is currently maintainer of sigstore-python, tuf-on-ci & python-tuf.
Tuesday November 12, 2024 1:25pm - 1:55pm MST
Alpine

2:00pm MST

Papers, Please - Scrutinizing AI Model Creation - Parth Patel, Kusari & Mihai Maruseac, Google
Tuesday November 12, 2024 2:00pm - 2:30pm MST
When an AI model misbehaves (e.g., it tells you to put glue on pizza), you must investigate how this happened. Sometimes these are accidents caused by the training data, but these incidents can also be due to nefarious activities – we’ve seen ML malware deployed in 2024. At the end of the day AI is still software, so security needs to be established around its creation. The same transparency and accountability must be enforced as with other parts of the software supply chain. Utilizing SLSA (Supply Chain Levels for Software Artifacts) and GUAC (Graph for Understanding Artifact Composition), we can determine the provenance of each dataset and the composition of each model. In this talk, we dive into the anatomy of AI model attacks: identifying bad models, determining the root cause of badness, and finding the blast radius of models affected. Once the data is collected, we can create an SBOM and distribute with the AI model provenance to meet compliance and transparency requirements.
Speakers
avatar for Mihai Maruseac

Mihai Maruseac

Staff SWE, Google
Mihai Maruseac is a member of Google Open Source Security team (GOSST), working on Supply Chain Security, mainly on GUAC. Before joining GOSST, Mihai created the TensorFlow Security team after joining Google, moving from a startup to incorporate Differential Privacy (DP) withing Machine... Read More →
avatar for Parth Patel

Parth Patel

Co-Founder, Kusari
Solutions Architect with 15+ years of CyberSecurity, DevOps, Software Development and Automation experience. He is an active member in the open source community contributing/path-finding on various projects. Maintainer on the OpenSSF project GUAC (Graph for Understanding Artifact... Read More →
Tuesday November 12, 2024 2:00pm - 2:30pm MST
Alpine

2:35pm MST

Charting the Path to Software Integrity: Red Hat’s Journey with Sigstore - Lance Ball & Brian Cook, Red Hat
Tuesday November 12, 2024 2:35pm - 3:05pm MST
In the evolving landscape of software supply chain security, Red Hat has embarked on a transformative journey, fully embracing the Sigstore ecosystem. Today, Red Hat's internal product pipelines rely on Sigstore’s Cosign to sign software releases, and Rekor provides an immutable transaction log, enabling customers to verify the integrity of downloaded software artifacts. This integration has been pivotal in ensuring the trustworthiness of the software that Red Hat distributes. As we navigated the intricacies of this integration, we gained deep insights into how Sigstore functions, encountered and overcame various challenges, and refined our approach to secure software delivery. In deploying Sigstore internally, we faced a number of obstacles that could make it challenging for large enterprises to adopt Sigstore for their own software delivery supply chains. We want to share with you how we overcame these challenges, and how we think the Sigstore ecosystem of services can be improved. Join us as we take you through Red Hat’s journey with Sigstore —sharing valuable lessons learned, highlighting the pitfalls we encountered, and showcasing how we fortified our software supply chain.
Speakers
avatar for Lance Ball

Lance Ball

Engineering Manager / Sr. Principal Engineer, Red Hat
Lance is the engineering manager for Red Hat Trusted Artifact Signer and a senior principal engineer. Previously, Knative Steering Committee and Functions Working Group lead. He is an active open source contributor, an avid cyclist, and a committed sourdough bread baker. You can find... Read More →
avatar for Brian Cook

Brian Cook

Product Manager, Red Hat
Brian has worked on product build systems at Red Hat for 8 years. Co-founder of Konflux CI and Enterprise Contract projects. He believes there is a path to make continuous delivery and secure software supply chain coexist peacefully.
Tuesday November 12, 2024 2:35pm - 3:05pm MST
Alpine

3:10pm MST

Understanding the Identity of a CI Platform - Richard Fan, N/A
Tuesday November 12, 2024 3:10pm - 3:25pm MST
In Sigstore, the signer information is embedded from OIDC tokens into the signing certificate. Among those information, the Subject Alternative Name (SAN) is the most crucial piece representing the signer's primary identity. Picking the proper attribute as SAN is not easy; there is no one-size-fits-all answer. This is especially obvious when CI platforms are involved, with so many attributes describing the repository owner, source code, builder, etc. Which one makes the most sense as the primary identity? In this session, we will walk through a common mistake people make when using Sigstore in conjunction with GitHub Actions. We will also discuss the differences in understanding the SAN of Fulcio certificates issued to different CI platforms (e.g., GitHub Actions and GitLab pipeline) due to their behavior differences. More importantly, we will discuss what you should think about when using Sigstore on those CI platforms.
Speakers
avatar for Richard Fan

Richard Fan

Cybersecurity Engineer, Independent
Richard is a Security Engineer and an AWS Security Hero. He is dedicated to helping people quickly adopt the cloud, promoting best practices, and streamlining cloud governance. Richard's experience over the years has allowed him to focus more on making security on the cloud easy... Read More →
Tuesday November 12, 2024 3:10pm - 3:25pm MST
Alpine

3:27pm MST

TUF Love for Your Containers: Preventing Rollback Attacks - Jonny Stoten, Docker
Tuesday November 12, 2024 3:27pm - 3:40pm MST
In the ever-evolving world of containerized applications, securing the software supply chain has never been more critical. The Update Framework (TUF) has emerged as the trusted solution for securing software updates, but integrating its powerful security model into OCI registries has proven elusive—until now.

This talk introduces a new method for embedding TUF metadata directly into OCI registries leveraging the powerful features of registries’ content-addressable storage. You will learn how the approach protects against rollback attacks, simplifies metadata resolution, and enhances overall container image supply chain security.

We will dig into the details of TUF, tag timestamping and in-toto attestations. Whether you’re managing large container ecosystems or securing critical infrastructure, this talk will provide a glimpse into what’s on the horizon for container supply chain security!
Speakers
Tuesday November 12, 2024 3:27pm - 3:40pm MST
Alpine

3:40pm MST

Break
Tuesday November 12, 2024 3:40pm - 3:55pm MST
Tuesday November 12, 2024 3:40pm - 3:55pm MST
Alpine

3:55pm MST

Sigstore & TUF Conformance Testing: Are Clients Playing by the Rules? - Adam Korczynski, Ada Logics & Jussi Kukkonen, Google
Tuesday November 12, 2024 3:55pm - 4:25pm MST
The Sigstore and TUF communities both maintain conformance test suites that have been helpful in identifying inconsistencies and security vulnerabilities in clients. This talk offers a deep dive into these two conformance test suites. We first talk about the issues that lead to their development: Interoperability issues and vulnerabilities are painful everywhere but especially so in the field of supply chain security. We then describe the architecture of the test suites and take a look at the engineering and the unique technical problems in conformance testing systems like this: When all test data is by definition cryptographically signed, creating test cases can be very tricky. Next, we cover with practical examples how clients can adopt the test suites and share the experiences client developers have had when adopting the test suites.. Finally, we will examine the impact of these efforts on the Sigstore and TUF ecosystems and how compatibility is improving and clients are becoming more secure. We finish the talk by discussing future ideas for the conformance test suites and how the community can contribute.
Speakers
avatar for Adam Korczynski

Adam Korczynski

Security Engineer, Ada Logics
Adam is a security engineer at Ada Logics where his work mainly focuses on security automation. He is heavily involved in open source projects and is a top contributor to OSS-Fuzz.
avatar for Jussi Kukkonen

Jussi Kukkonen

Open source supply chain security @ Google, Google
Jussi secures Open Source supply chains at Google. He has extensive Open Source experience and is currently maintainer of sigstore-python, tuf-on-ci & python-tuf.
Tuesday November 12, 2024 3:55pm - 4:25pm MST
Alpine

4:30pm MST

CISA: Casting New Light on Supply Chain Artifacts - Tim Pepper, CISA
Tuesday November 12, 2024 4:30pm - 5:00pm MST
The US Cybersecurity and Infrastructure Security Agency (CISA) leads the national effort to understand, manage, and reduce risk to critical cyber infrastructure. This requires vulnerability management processes based on well illuminated data. But gaps are visible at the intersection of software identification and supply chain management tools and automation. Software identifiers may be invisible or too opaque to be sufficiently effective for vulnerability management at scale or at later points along a supply chain. This lightning talk will describe a funding initiative recently announced by CISA and the US Department of Homeland Security’s Science and Technology Directorate to improve usability and scalable implementations of intrinsic identifiers, artifact dependency graph (ADG) generation, and distribution of ADG’s along with typical supply chain artifacts. The Silicon Valley Innovation Program (SVIP) Other Transaction Solicitation (OTS) Topic Call 70RSAT24R00000042 aims to invest in startups advancing the state of the art in ways which likely benefit CISA’s vulnerability management work. AND do so with foundational technologies implemented as open source!
Speakers
avatar for Timothy Pepper

Timothy Pepper

Senior Technical Advisor, Open Source Software Security, Cybersecurity and Infrastructure Security Agency
Tim Pepper is an engineer with over 25 years in open source, with contributions to Kubernetes (emeritus Steering Committee elected member, emeritus Code of Conduct Committee elected member; past SIG Release co-chair and WG LTS co-organizer), open source security projects, Linux kernel/drivers/distributions... Read More →
Tuesday November 12, 2024 4:30pm - 5:00pm MST
Alpine

5:05pm MST

Sigstore-Powered Hunting: Uncovering North Korean APT Attacks on the OSS Supply Chain - Poppaea McDermott, Stacklok
Tuesday November 12, 2024 5:05pm - 5:35pm MST
Attackers are increasingly exploiting the trust-based, interconnected nature of the open source supply chain, with malware being distributed through package ecosystems, often hidden within the complexity of upstream dependencies. In this talk, we will showcase how Sigstore provenance can serve as a powerful source of truth for verifying package proof-of-origin. The absence of clear provenance, combined with other metadata signals, can act as a strong indicator of potential malicious intent. As a case study, we will discuss a recent spike in DPRK state-sponsored attacks hosted on NPM, where APT groups aimed to harvest cryptocurrencies and establish backdoors on developer machines. Attendees will gain valuable insights into the critical role Sigstore plays in supply chain threat detection, and understand how its broader adoption can help protect the entire ecosystem. By promoting stronger provenance verification, the community can more effectively distinguish between legitimate packages and harmful imitations.
Speakers
avatar for Poppaea McDermott

Poppaea McDermott

Security Researcher, Stacklok
Poppaea is a Security Researcher at Stacklok. She focuses on using data-driven techniques to hunt for threats in the open source supply chain. Prior to joining Stacklok, she was a Senior Threat Hunter in WithSecure’s Managed Detection and Response capability.
Tuesday November 12, 2024 5:05pm - 5:35pm MST
Alpine

5:40pm MST

The SBOM Revolution: How Sigstore, in-Toto, SBOMit, and Bomctl Are Changing the Game - Ian Dunbar-Hall, Lockheed Martin & Marc Frankel, Manifest
Tuesday November 12, 2024 5:40pm - 6:10pm MST
Software Bill of Materials (SBOMs) are no longer merely compliance checkboxes. They're indispensable tools for understanding and mitigating vulnerabilities in the software supply chain. High-profile attacks like Log4Shell, SolarWinds, and Apache Struts have underscored the critical importance of software supply chain security. Sigstore's signing and transparency features when paired with in-toto attestations offer approaches to tracking components within SBOMs and pedigree of SBOMs themselves. This talk will delve into how OpenSSF projects like SBOMit can enhance existing SBOM management strategies to address supply chain risks. We'll also explore how to effectively consume SBOMs using various platforms using bomctl.
Speakers
avatar for Ian Dunbar-Hall

Ian Dunbar-Hall

Lockheed Martin Open Source Program Office, Lockheed Martin
Ian leads Lockheed Martin's Open Source Program Office and specializes in DevSecOps and full stack engineering. Additionally he is a maintainer on SBOMit and bomctl. He is also an OpenSSF Governing Board General Member Representative.
avatar for Marc Frankel

Marc Frankel

Manifest CEO/Cofounder, Manifest
Marc Frankel is the CEO and cofounder of Manifest, a cybersecurity company delivering SBOM & software supply chain security to governments and enterprises worldwide. Marc is a passionate software supply chain security advocate and author of several resources on third-party SBOM collection... Read More →
Tuesday November 12, 2024 5:40pm - 6:10pm MST
Alpine
 
  • Filter By Venue
  • Filter By Type
  • Company
  • Timezone

Share Modal

Share this link via

Or copy link

Filter sessions
Apply filters to sessions.