Online / 5 & 6 February 2022

visit

D.trusted-hardware


Day Start End Track(s)
Saturday 10:00 → 17:30 Hardware-Aided Trusted Computing
09 10 11 12 13 14 15 16 17
Saturday Opening
Welcome, overview, lineup
SGX Enclave Exploits Analysis
Considerations for defensive SGX programming
Gramine Library OS
Overview, current state and future plans
WebAssembly + Confidential Computing
Enarx first release brings WebAssembly to Confidential Computing
Short break
15 minutes
Privacy-preserving video object detection in WebAssembly inside Veracruz Symbolic Validation of SGX enclaves using Guardian
Avoid known enclave vulnerabilities by automatically checking for orderliness​
Lunch break
1 hour
Logging, debugging and error management in Confidential Computing
Challenges around maintaining confidentiality and integrity when logging
Secure boot, TEEs, different OSes and more
Making sense of the trusted computing landscape in Eclipse Oniro embedded distribution
Arm CCA enablement through the Trusted Firmware community project Short break
15 minutes
Rethinking the OS for Isolation Flexibility with FlexOS Intravisor -- a hypervisor for fine-grained isolation using CHERI Developing for the AWS Nitro platform
A new Enclave Development Platform (EDP) target
Short break
20 minutes
Process-based abstractions for VM-based environments

Events

Title Track Start End

Saturday

  Opening
Welcome, overview, lineup
Hardware-Aided Trusted Computing 10:00 10:05
  SGX Enclave Exploits Analysis
Considerations for defensive SGX programming
Hardware-Aided Trusted Computing 10:05 10:30
  Gramine Library OS
Overview, current state and future plans
Hardware-Aided Trusted Computing 10:30 10:55
  WebAssembly + Confidential Computing
Enarx first release brings WebAssembly to Confidential Computing
Hardware-Aided Trusted Computing 10:55 11:20
  Short break
15 minutes
Hardware-Aided Trusted Computing 11:20 11:35
  Privacy-preserving video object detection in WebAssembly inside Veracruz Hardware-Aided Trusted Computing 11:35 12:00
  Symbolic Validation of SGX enclaves using Guardian
Avoid known enclave vulnerabilities by automatically checking for orderliness​
Hardware-Aided Trusted Computing 12:00 12:25
  Lunch break
1 hour
Hardware-Aided Trusted Computing 12:25 13:25
  Logging, debugging and error management in Confidential Computing
Challenges around maintaining confidentiality and integrity when logging
Hardware-Aided Trusted Computing 13:25 13:50
  Secure boot, TEEs, different OSes and more
Making sense of the trusted computing landscape in Eclipse Oniro embedded distribution
Hardware-Aided Trusted Computing 13:50 14:15
  Arm CCA enablement through the Trusted Firmware community project Hardware-Aided Trusted Computing 14:15 14:40
  Short break
15 minutes
Hardware-Aided Trusted Computing 14:40 14:55
  Rethinking the OS for Isolation Flexibility with FlexOS Hardware-Aided Trusted Computing 14:55 15:20
  Intravisor -- a hypervisor for fine-grained isolation using CHERI Hardware-Aided Trusted Computing 15:20 15:45
  Developing for the AWS Nitro platform
A new Enclave Development Platform (EDP) target
Hardware-Aided Trusted Computing 15:45 16:10
  Short break
20 minutes
Hardware-Aided Trusted Computing 16:10 16:30
  Process-based abstractions for VM-based environments Hardware-Aided Trusted Computing 16:30 17:30