Brussels / 4 & 5 February 2023

schedule

Confidential Computing devroom


Room 09 10 11 12 13 14 15 16 17 18
Saturday D.confidential (online) Rust based Shim-Firmware for confidential container Project Veraison (VERificAtIon of atteStatiON)
(Trying to) making sense of chaos
Nydus Image Service for Confidential Containers THE BASE - FOSS Confidential Container SDK to ease the development A Study of Fine-Grain Compartment Interface Vulnerabilities: What, Why, and What We Should Do About Them Building a secure network of trusted applications on untrusted hosts Scalable Confidential Computing on Kubernetes with Marblerun Gramine Library OS
Running unmodified Linux applications in Intel SGX enclaves
Confidential Containers and the Pitfalls of Runtime Attestation
Sunday K.4.601 We need a Let’s Encrypt movement for Confidential Computing
The importance of protecting data in use
LSKV: Democratising Confidential Computing from the Core Keeping safety-critical programs alive when Linux isn’t able to
Using OP-TEE to deliver availability to applications in a Trusted Execution Environment.
Open Source Confidential Computing with RISC-V Introduction to Secure Execution for s390x
KVM confidential VMs on IBM Z
Tilting a Pyramid
Confidentiality in a Cloud Native Environment
Salmiac: Running unmodified container images in Nitro Enclaves Autonomous Confidential Kubernetes
How to securely manage K8s from within K8s
Devroom closing and goodbye

Read the Call for Papers at https://lists.fosdem.org/pipermail/fosdem/2022q4/003434.html.

This devroom is devoted to the emerging open-source ecosystem around Confidential Computing, also known as Hardware-aided Trusted Computing or Trusted Execution Environments (TEEs) which make use of modern hardware extensions like Intel SGX/TDX, ARM TrustZone/CCA, AMD SEV/SNP and others. With today's mainstream consumer hardware being increasingly shipped with these advanced trusted computing technologies, the devroom wants to foster discussion on the much-needed open-source TEE ecosystem amongst open-source hobbyists, academics, enthusiasts, and project maintainers. The devroom’s topics of interest include, but are not limited to:

⚠️ This is a hybrid devroom. The Saturday program will be online and the Sunday program will be on-campus ⚠️.

Event Speakers Room Start End

Saturday

  Rust based Shim-Firmware for confidential container Jiewen Yao D.confidential (online) 13:00 13:25
  Project Veraison (VERificAtIon of atteStatiON)
(Trying to) making sense of chaos
Thomas Fossati D.confidential (online) 13:30 13:55
  Nydus Image Service for Confidential Containers Jiang Liu D.confidential (online) 14:30 14:55
  THE BASE - FOSS Confidential Container SDK to ease the development Sebastian Gajek D.confidential (online) 15:00 15:25
  A Study of Fine-Grain Compartment Interface Vulnerabilities: What, Why, and What We Should Do About Them Hugo Lefeuvre D.confidential (online) 15:30 15:55
  Building a secure network of trusted applications on untrusted hosts Roman Volosatovs D.confidential (online) 16:00 16:25
  Scalable Confidential Computing on Kubernetes with Marblerun Moritz Eckert, Thomas Tendyck D.confidential (online) 16:30 16:55
  Gramine Library OS
Running unmodified Linux applications in Intel SGX enclaves
Vijay Dhanraj D.confidential (online) 17:00 17:25
  Confidential Containers and the Pitfalls of Runtime Attestation Tobin Feldman-Fitzthum D.confidential (online) 17:30 17:55

Sunday

  We need a Let’s Encrypt movement for Confidential Computing
The importance of protecting data in use
Patrick Uiterwijk, Nick Vidal K.4.601 13:10 13:30
  LSKV: Democratising Confidential Computing from the Core Andrew Jeffery K.4.601 13:30 13:50
  Keeping safety-critical programs alive when Linux isn’t able to
Using OP-TEE to deliver availability to applications in a Trusted Execution Environment.
Tom Van Eyck K.4.601 13:50 14:10
  Open Source Confidential Computing with RISC-V Samuel Ortiz K.4.601 14:20 14:45
  Introduction to Secure Execution for s390x
KVM confidential VMs on IBM Z
Claudio Imbrenda, Steffen Eiden K.4.601 14:50 15:15
  Tilting a Pyramid
Confidentiality in a Cloud Native Environment
Magnus Kulke K.4.601 15:30 15:55
  Salmiac: Running unmodified container images in Nitro Enclaves Aditi Jannu, Nikita Shyrei K.4.601 16:00 16:25
  Autonomous Confidential Kubernetes
How to securely manage K8s from within K8s
Moritz Eckert, Malte Poll K.4.601 16:30 16:55
  Devroom closing and goodbye Fabiano Fidêncio, Jo Van Bulck, Fritz Alder K.4.601 16:55 17:00