[FOSDEM] [CFP] Hardware-Aided Trusted Computing devroom
Fritz Alder
fritz.alder at kuleuven.be
Mon Dec 6 12:43:39 UTC 2021
Hey all,
we're excited that we can hold the Hardware-Aided Trusted Computing
devroom again next year!
I pasted the CfP below but you can also find a nicely formatted version
of it here: https://falder.org/fosdem22-cfp
If you have questions or want to volunteer as a moderator during the
talks, feel free to reach out to me!
Best,
Fritz Alder
Jo Van Bulck
Vasily Sartakov
--
# FOSDEM 2022 (Online) - Hardware-Aided Trusted Computing Devroom Call
For Participation
--------
Submission deadline : 23/12/2021
--------
## About FOSDEM
[FOSDEM](https://fosdem.org/2022/) is a free event for software
developers to meet, share ideas and collaborate. Every year, thousands
of developers of free and open source software from all over the world
gather at the event in Brussels. In 2022, they will again gather online.
FOSDEM is free to attend. There is no registration.
## Devroom overview and objectives
Following the success of [last year's
edition](https://archive.fosdem.org/2021/schedule/track/hardware_aided_trusted_computing/),
we are for the 3rd time organizing a devroom devoted to the emerging
open-source ecosystem around *hardware-based Trusted Execution
Environments (TEEs)*. Under TEEs, we understand architectures that allow
to isolate and attest trusted "enclave" software components running on
top of a potentially compromised operating system. Over the last years,
all major processor vendors have developed some form of TEE support,
e.g., Intel's [Software Guard Extensions
(SGX)](https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions.html)
and [Trust Domain Extensions
(TDX)](https://software.intel.com/content/www/us/en/develop/articles/intel-trust-domain-extensions.html),
ARM's
[TrustZone](https://developer.arm.com/ip-products/security-ip/trustzone)
and upcoming [Confidential Compute Architecture (Arm
CCA)](https://developer.arm.com/architectures/architecture-security-features/confidential-computing)
as well as
[Morello](https://developer.arm.com/architectures/cpu-architecture/a-profile/morello),
AMD's [Secure Encrypted Virtualization
(SEV)](https://developer.amd.com/sev/) and upcoming SEV-ES/SEV-SNP
extensions, and IBM's [Protected Execution Facility
(PEF)](https://www.kernel.org/doc/html/latest/powerpc/ultravisor.html).
Hence, with today's mainstream consumer hardware being increasingly
shipped with these advanced trusted computing technologies, this devroom
wants to foster discussion on the much-needed open-source TEE ecosystem
amongst industry players, academics, enthusiasts, hobbyists, and project
maintainers.
## Desirable topics
The devroom's topics of interest include, but are not limited to:
* Programming frameworks for TEEs: how to develop free and open-source
software that can run inside enclaves (e.g., library OSs, SDKs, Linux
kernel support, etc.).
* Compiler and language support for emerging trusted hardware extensions.
* Open-source enclave processor designs (e.g., RISC-V TEEs).
* Use cases and applications on top of TEEs.
* TEE-specific attacks and defenses: reverse engineering, side-channels,
vulnerabilities, exploits.
* Vision: future TEEs (what is missed, proposals, wishes, discussions).
## New old rules: What (unfortunately) did not change since last year
For obvious reasons, the event will still not take place in a physical
location but online.
* The reference time will again be [Brussels local lime
(CET)](https://www.timeanddate.com/worldclock/belgium/brussels).
* Talks will be pre-recorded in advance, and streamed during the event.
If your talk is selected, you can expect a recording deadline around
January 15.
* Q/A session will be take live.
* A facility will be provided for people watching to chat between
themselves.
* A facility will be provided for people watching to submit questions.
* Once your talk was accepted, we will assign you a deputy to help you
to produce the pre-recorded content.
* During the stream of your talk, you must be available online for the
Q/A session
We had interesting discussions after the talks of last year, so we hope
that this format will work well again.
## Key dates
* Submission deadline: 23 December 2021
* Announcement of selected talks: 31 December 2021
* Deadline for the pre-recorded talks: Around January 15, 2022
* Conference dates 5 & 6 February 2022 **(online)**
* Hardware-Aided Trusted Computing devroom date: Saturday 5 February
2022 **(online)**
## Submit a talk proposal
Submissions are required to proceed through the [FOSDEM 2022 Pentabarf
website](https://penta.fosdem.org/submission/FOSDEM22). If you do not
know how to use Pentabarf yet, you can [read a beginner's guide
here](https://medium.com/@maartjeme/beginners-guide-to-pentabarf-78808a1ce5bf).
Your submission must include the following information:
* Your contact email.
* The title (and possible subtitle) of your talk: please be descriptive,
as the audience will have to choose to attend your talk out of a listing
with ~500 talks from other projects at FOSDEM.
* Select "Hardware-Aided Trusted Computing devroom" as the track.
* A short abstract of one paragraph.
* A longer description if you wish to do so.
* Links to related websites / blogs etc.
You should target a talk duration of 20 minutes (pre-recorded) with 5
mins of live Q&A (leaves us with 5 mins change over for talks).
## Contact and organizers
* Main organizer: Fritz Alder (fritz.alder at cs.kuleuven.be)
* Devroom URL on the FOSDEM website:
<https://fosdem.org/2022/schedule/track/hardware_aided_trusted_computing/>
* The devroom is supported by the [Confidential Computing
Consortium](https://confidentialcomputing.io/).
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.fosdem.org/pipermail/fosdem/attachments/20211206/8d3bed0a/attachment-0001.html>
The content of all messages is the sole responsibility of the author.
More information about the FOSDEM
mailing list