[FOSDEM] [CFP] Hardware-Aided Trusted Computing Devroom
Jo Van Bulck
jo.vanbulck at cs.kuleuven.be
Mon Dec 7 11:23:03 UTC 2020
for updates check: https://jovanbulck.github.io/fosdem21-cfp
Following the success of [last year's
edition](https://archive.fosdem.org/2020/schedule/track/hardware_aided_trusted_computing/),
we are for the 2nd time organizing a devroom devoted to the emerging
open-source ecosystem around *hardware-based Trusted Execution
Environments (TEEs)*. Under TEEs, we understand architectures that allow
to isolate and attest trusted "enclave" software components running on
top of a potentially compromised operating system. Over the last years,
all major processor vendors have developed some form of TEE support,
e.g., Intel's [Software Guard Extensions
(SGX)](https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions.html)
and upcoming [Trust Domain Extensions
(TDX)](https://software.intel.com/content/www/us/en/develop/articles/intel-trust-domain-extensions.html),
ARM's
[TrustZone](https://developer.arm.com/ip-products/security-ip/trustzone)
and upcoming
[Morello](https://developer.arm.com/architectures/cpu-architecture/a-profile/morello),
AMD's [Secure Encrypted Virtualization
(SEV)](https://developer.amd.com/sev/) and upcoming SEV-ES/SEV-SNP
extensions, and IBM's [Protected Execution Facility
(PEF)](https://www.kernel.org/doc/html/latest/powerpc/ultravisor.html).
Hence, with today's mainstream consumer hardware being increasingly
shipped with these advanced trusted computing technologies, this devroom
wants to foster discussion on the much-needed open-source TEE ecosystem
amongst industry players, academics, enthusiasts, hobbyists, and project
maintainers.
## Desirable topics
The devroom's topics of interest include, but are not limited to:
* Programming frameworks for TEEs: how to develop free and open-source
software that can run inside enclaves (e.g., library OSs, SDKs, Linux
kernel support, etc.).
* Compiler and language support for emerging trusted hardware extensions.
* Open-source enclave processor designs (e.g., RISC-V TEEs).
* Use cases and applications on top of TEEs.
* TEE-specific attacks and defenses: reverse engineering, side-channels,
vulnerabilities, exploits.
* Vision: future TEEs (what is missed, proposals, wishes, discussions).
## New rules: What changes since last year
For obvious reasons, this year the event will not take place in a
physical location but online.
* The reference time will be [Brussels local lime
(CET)](https://www.timeanddate.com/worldclock/belgium/brussels).
* Talks will be pre-recorded in advance, and streamed during the event.
* Q/A session will be take live.
* A facility will be provided for people watching to chat between
themselves.
* A facility will be provided for people watching to submit questions.
* Once your talk was accepted, we will assign you a deputy to help you
to produce the pre-recorded content.
* During the stream of your talk, you must be available online for the
Q/A session
## Key dates
* <mark>Submission deadline: 23 December 2020</mark>
* Announcement of selected talks: 31 December 2020
* Conference dates 6 & 7 February 2021 **(online)**
* Hardware-Aided Trusted Computing devroom date: Saturday 6 February
2021 **(online)**
## Submit a talk proposal
Submissions are required to proceed through the [FOSDEM 2021 Pentabarf
website](https://penta.fosdem.org/submission/FOSDEM21). Create an
"event" and click on "Show all" in the top right corner to display the
full form.
Your submission must include the following information:
* Your contact email.
* The title (and possible subtitle) of your talk: please be descriptive,
as the audience will have to choose to attend your talk out of a listing
with ~500 talks from other projects at FOSDEM.
* Select "Hardware-Aided Trusted Computing devroom" as the track.
* A short abstract of one paragraph.
* A longer description if you wish to do so.
* Links to related websites / blogs etc.
## Contact and organizers
* Main organizer: Jo Van Bulck (jo.vanbulck at cs.kuleuven.be)
* The devroom is supported by the [Confidential Computing
Consortium](https://confidentialcomputing.io/).
The content of all messages is the sole responsibility of the author.
More information about the FOSDEM
mailing list