Confidential Computing devroom
Room:
H.2214
Calendar:
iCal, xCal
Read the Call for Papers at https://lists.fosdem.org/pipermail/fosdem/2023q4/003505.html.
This devroom is devoted to the emerging open-source ecosystem around Confidential Computing, also known as Hardware-aided Trusted Computing or Trusted Execution Environments (TEEs) which make use of modern hardware extensions like Intel SGX/TDX, ARM TrustZone/CCA, AMD SEV/SNP and others. Hence, with today's mainstream consumer hardware being increasingly shipped with these advanced trusted computing technologies, this devroom wants to foster discussion on the much-needed free and open-source TEE ecosystem amongst industry players, academics, enthusiasts, hobbyists, and project maintainers. The devroom’s topics of interest include, but are not limited to:
- Free and open source confidential computing
- Programming frameworks for TEEs: how to develop free and open-source software that can run inside enclaves (e.g., library OSs, SDKs, Linux kernel support, etc.).
- Confidential computing deployment: Challenges and benefits
- Use cases and applications on top of TEEs such as applying confidential computing to the Cloud Native space
- Compiler and language support for emerging trusted hardware extensions
- Open-source enclave processor designs (e.g., RISC-V TEEs)
- Attestation, also across different technologies
- Existing technologies:
- What do they have in common, how do they differ?
- Which confidential computing use cases can they cover?
- Upcoming technologies:
- TEEs on accelerators (GPUs, NPUs, DPUs, etc)
- Interaction between existing and upcoming technologies
- Opportunities
- Vision: future TEEs (what is missed, proposals, wishes, discussions).
- TEE-specific attacks and defenses: reverse engineering, side-channels, vulnerabilities, exploits.