Confidential Computing devroom
Rooms:
K.4.601, D.confidential (online)
Calendar:
iCal, xCal
Read the Call for Papers at https://lists.fosdem.org/pipermail/fosdem/2022q4/003434.html.
This devroom is devoted to the emerging open-source ecosystem around Confidential Computing, also known as Hardware-aided Trusted Computing or Trusted Execution Environments (TEEs) which make use of modern hardware extensions like Intel SGX/TDX, ARM TrustZone/CCA, AMD SEV/SNP and others. With today's mainstream consumer hardware being increasingly shipped with these advanced trusted computing technologies, the devroom wants to foster discussion on the much-needed open-source TEE ecosystem amongst open-source hobbyists, academics, enthusiasts, and project maintainers. The devroom’s topics of interest include, but are not limited to:
- Free and open source confidential computing
- Programming frameworks for TEEs (how best to program and use TEEs)
- Attestation in confidential computing
- Compiler and language support
- Free and open source enclave processor designs (e.g., RISC-V TEEs)
- Applying Confidential Computing to the Cloud Native space
- Confidential Computing Deployment
- TEE-specific attacks and defenses: reverse engineering, side-channels, vulnerabilities, exploits
- Vision: Future TEEs (what is missed, proposals, wishes, discussions)
- Confidential Computing and trust
⚠️ This is a hybrid devroom. The Saturday program will be online and the Sunday program will be on-campus ⚠️.