Brussels / 3 & 4 February 2024

schedule

Confidential Computing devroom


09 10 11 12 13 14 15 16 17 18
Sunday Confidential Computing devroom welcome
Intel TDX Deep Dive
SEV-Step: A Single-Stepping Framework for AMD-SEV
Shielding Data, Embracing Openness, Optimizing Performance: A Journey Through Trustworthy Environments for Database Systems
The ups and downs of running enclaves in production
Securing Embedded Systems with fTPM implemented as Trusted Application in TEE
Integrity Protect Workloads with Mushroom
Reproducible builds for confidential computing: Why remote attestation is worthless without it
Increasing Trust and Preserving Privacy: Advancing Remote Attestation

Read the Call for Papers at https://lists.fosdem.org/pipermail/fosdem/2023q4/003505.html.

This devroom is devoted to the emerging open-source ecosystem around Confidential Computing, also known as Hardware-aided Trusted Computing or Trusted Execution Environments (TEEs) which make use of modern hardware extensions like Intel SGX/TDX, ARM TrustZone/CCA, AMD SEV/SNP and others. Hence, with today's mainstream consumer hardware being increasingly shipped with these advanced trusted computing technologies, this devroom wants to foster discussion on the much-needed free and open-source TEE ecosystem amongst industry players, academics, enthusiasts, hobbyists, and project maintainers. The devroom’s topics of interest include, but are not limited to:

Event Speakers Start End

Sunday

  Confidential Computing devroom welcome
Fritz Alder, Jo Van Bulck, Fabiano Fidêncio 13:15 13:30
  Intel TDX Deep Dive
Benny Fuhry 13:35 13:55
  SEV-Step: A Single-Stepping Framework for AMD-SEV
Luca Wilke 14:00 14:20
  Shielding Data, Embracing Openness, Optimizing Performance: A Journey Through Trustworthy Environments for Database Systems
Ilaria Battiston, Lotte Felius 14:25 14:45
  The ups and downs of running enclaves in production
Cian Butler 14:55 15:15
  Securing Embedded Systems with fTPM implemented as Trusted Application in TEE
Tymoteusz Burak 15:20 15:40
  Integrity Protect Workloads with Mushroom
Tom Dohrmann 15:50 16:10
  Reproducible builds for confidential computing: Why remote attestation is worthless without it
Malte Poll, Paul Meyer 16:15 16:35
  Increasing Trust and Preserving Privacy: Advancing Remote Attestation
Ionut Mihalcea, Thomas Fossati 16:40 17:00