Online / 5 & 6 February 2022

visit

Hardware-Aided Trusted Computing devroom


09 10 11 12 13 14 15 16 17
Saturday Opening
Welcome, overview, lineup
SGX Enclave Exploits Analysis
Considerations for defensive SGX programming
Gramine Library OS
Overview, current state and future plans
WebAssembly + Confidential Computing
Enarx first release brings WebAssembly to Confidential Computing
Short break
15 minutes
Privacy-preserving video object detection in WebAssembly inside Veracruz Symbolic Validation of SGX enclaves using Guardian
Avoid known enclave vulnerabilities by automatically checking for orderliness​
Lunch break
1 hour
Logging, debugging and error management in Confidential Computing
Challenges around maintaining confidentiality and integrity when logging
Secure boot, TEEs, different OSes and more
Making sense of the trusted computing landscape in Eclipse Oniro embedded distribution
Arm CCA enablement through the Trusted Firmware community project Short break
15 minutes
Rethinking the OS for Isolation Flexibility with FlexOS Intravisor -- a hypervisor for fine-grained isolation using CHERI Developing for the AWS Nitro platform
A new Enclave Development Platform (EDP) target
Short break
20 minutes
Process-based abstractions for VM-based environments

Read the Call for Papers at https://lists.fosdem.org/pipermail/fosdem/2021q4/003334.html.

This devroom is devoted to the emerging open-source ecosystem around Trusted Execution Environments (TEEs) which make use of modern hardware extensions like Intel SGX, ARM TrustZone, AMD SEV/SME and others. With today's mainstream consumer hardware being increasingly shipped with these advanced trusted computing technologies, the devroom wants to foster discussion on the much-needed open-source TEE ecosystem amongst open-source hobbyists, academics, enthusiasts, and project maintainers. The devroom’s topics of interest include, but are not limited to:

Event Speakers Start End

Saturday

  Opening
Welcome, overview, lineup
Jo Van Bulck, Fritz Alder 10:00 10:05
  SGX Enclave Exploits Analysis
Considerations for defensive SGX programming
Shunda Zhang 10:05 10:30
  Gramine Library OS
Overview, current state and future plans
Dmitrii Kuvaiskii 10:30 10:55
  WebAssembly + Confidential Computing
Enarx first release brings WebAssembly to Confidential Computing
Nick Vidal 10:55 11:20
  Short break
15 minutes
Fritz Alder 11:20 11:35
  Privacy-preserving video object detection in WebAssembly inside Veracruz Guilhem Bryant 11:35 12:00
  Symbolic Validation of SGX enclaves using Guardian
Avoid known enclave vulnerabilities by automatically checking for orderliness​
Pedro Antonino 12:00 12:25
  Lunch break
1 hour
Fritz Alder 12:25 13:25
  Logging, debugging and error management in Confidential Computing
Challenges around maintaining confidentiality and integrity when logging
Mike Bursell 13:25 13:50
  Secure boot, TEEs, different OSes and more
Making sense of the trusted computing landscape in Eclipse Oniro embedded distribution
Marta Rybczynska 13:50 14:15
  Arm CCA enablement through the Trusted Firmware community project Charles Garcia-Tobin, Matteo Carlini 14:15 14:40
  Short break
15 minutes
Fritz Alder 14:40 14:55
  Rethinking the OS for Isolation Flexibility with FlexOS Hugo Lefeuvre 14:55 15:20
  Intravisor -- a hypervisor for fine-grained isolation using CHERI Vasily A. Sartakov 15:20 15:45
  Developing for the AWS Nitro platform
A new Enclave Development Platform (EDP) target
Raoul Strackx 15:45 16:10
  Short break
20 minutes
Fritz Alder 16:10 16:30
  Process-based abstractions for VM-based environments Vasily A. Sartakov, Jethro G. Beekman 16:30 17:30