Saturday |
|
Opening Welcome, overview, lineup |
Hardware-Aided Trusted Computing |
10:00 |
10:05 |
|
SGX Enclave Exploit Analysis and Considerations for Defensive SGX Programming |
Hardware-Aided Trusted Computing |
10:05 |
10:30 |
|
Gramine Library OS Overview, current state and future plans |
Hardware-Aided Trusted Computing |
10:30 |
10:55 |
|
WebAssembly + Confidential Computing Enarx first release brings WebAssembly to Confidential Computing |
Hardware-Aided Trusted Computing |
10:55 |
11:20 |
|
Short break 15 minutes |
Hardware-Aided Trusted Computing |
11:20 |
11:35 |
|
Privacy-preserving video object detection in WebAssembly inside Veracruz |
Hardware-Aided Trusted Computing |
11:35 |
12:00 |
|
Symbolic Validation of SGX enclaves using Guardian Avoid known enclave vulnerabilities by automatically checking for orderliness​ |
Hardware-Aided Trusted Computing |
12:00 |
12:25 |
|
Lunch break 1 hour |
Hardware-Aided Trusted Computing |
12:25 |
13:25 |
|
Logging, debugging and error management in Confidential Computing Challenges around maintaining confidentiality and integrity when logging |
Hardware-Aided Trusted Computing |
13:25 |
13:50 |
|
Secure boot, TEEs, different OSes and more Making sense of the trusted computing landscape in Eclipse Oniro embedded distribution |
Hardware-Aided Trusted Computing |
13:50 |
14:15 |
|
Arm CCA enablement through the Trusted Firmware community project |
Hardware-Aided Trusted Computing |
14:15 |
14:40 |
|
Short break 15 minutes |
Hardware-Aided Trusted Computing |
14:40 |
14:55 |
|
Rethinking the OS for Isolation Flexibility with FlexOS |
Hardware-Aided Trusted Computing |
14:55 |
15:20 |
|
Intravisor -- a hypervisor for fine-grained isolation using CHERI |
Hardware-Aided Trusted Computing |
15:20 |
15:45 |
|
Developing for the AWS Nitro Enclave Platform A new Enclave Development Platform (EDP) Target |
Hardware-Aided Trusted Computing |
15:45 |
16:10 |
|
Short break 20 minutes |
Hardware-Aided Trusted Computing |
16:10 |
16:30 |
|
Process-based abstractions for VM-based environments |
Hardware-Aided Trusted Computing |
16:30 |
17:30 |