[FOSDEM] [CFP] Hardware-Aided Trusted Computing devroom

Fritz Alder fritz.alder at kuleuven.be
Mon Dec 6 12:43:39 UTC 2021


Hey all,

we're excited that we can hold the Hardware-Aided Trusted Computing 
devroom again next year!

I pasted the CfP below but you can also find a nicely formatted version 
of it here: https://falder.org/fosdem22-cfp


If you have questions or want to volunteer as a moderator during the 
talks, feel free to reach out to me!

Best,
Fritz Alder
Jo Van Bulck
Vasily Sartakov

--


# FOSDEM 2022 (Online) - Hardware-Aided Trusted Computing Devroom Call 
For Participation

--------
Submission deadline : 23/12/2021
--------

## About FOSDEM

[FOSDEM](https://fosdem.org/2022/) is a free event for software 
developers to meet, share ideas and collaborate. Every year, thousands 
of developers of free and open source software from all over the world 
gather at the event in Brussels. In 2022, they will again gather online. 
FOSDEM is free to attend. There is no registration.

## Devroom overview and objectives

Following the success of [last year's 
edition](https://archive.fosdem.org/2021/schedule/track/hardware_aided_trusted_computing/), 
we are for the 3rd time organizing a devroom devoted to the emerging 
open-source ecosystem around *hardware-based Trusted Execution 
Environments (TEEs)*. Under TEEs, we understand architectures that allow 
to isolate and attest trusted "enclave" software components running on 
top of a potentially compromised operating system. Over the last years, 
all major processor vendors have developed some form of TEE support, 
e.g., Intel's [Software Guard Extensions 
(SGX)](https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions.html) 
and [Trust Domain Extensions 
(TDX)](https://software.intel.com/content/www/us/en/develop/articles/intel-trust-domain-extensions.html), 
ARM's 
[TrustZone](https://developer.arm.com/ip-products/security-ip/trustzone) 
and upcoming [Confidential Compute Architecture (Arm 
CCA)](https://developer.arm.com/architectures/architecture-security-features/confidential-computing) 
as well as 
[Morello](https://developer.arm.com/architectures/cpu-architecture/a-profile/morello), 
AMD's [Secure Encrypted Virtualization 
(SEV)](https://developer.amd.com/sev/) and upcoming SEV-ES/SEV-SNP 
extensions, and IBM's [Protected Execution Facility 
(PEF)](https://www.kernel.org/doc/html/latest/powerpc/ultravisor.html).

Hence, with today's mainstream consumer hardware being increasingly 
shipped with these advanced trusted computing technologies, this devroom 
wants to foster discussion on the much-needed open-source TEE ecosystem 
amongst industry players, academics, enthusiasts, hobbyists, and project 
maintainers.

## Desirable topics

The devroom's topics of interest include, but are not limited to:

* Programming frameworks for TEEs: how to develop free and open-source 
software that can run inside enclaves (e.g., library OSs, SDKs, Linux 
kernel support, etc.).
* Compiler and language support for emerging trusted hardware extensions.
* Open-source enclave processor designs (e.g., RISC-V TEEs).
* Use cases and applications on top of TEEs.
* TEE-specific attacks and defenses: reverse engineering, side-channels, 
vulnerabilities, exploits.
* Vision: future TEEs (what is missed, proposals, wishes, discussions).

## New old rules: What (unfortunately) did not change since last year

For obvious reasons, the event will still not take place in a physical 
location but online.

* The reference time will again be [Brussels local lime 
(CET)](https://www.timeanddate.com/worldclock/belgium/brussels).
* Talks will be pre-recorded in advance, and streamed during the event. 
If your talk is selected, you can expect a recording deadline around 
January 15.
* Q/A session will be take live.
* A facility will be provided for people watching to chat between 
themselves.
* A facility will be provided for people watching to submit questions.
* Once your talk was accepted, we will assign you a deputy to help you 
to produce the pre-recorded content.
* During the stream of your talk, you must be available online for the 
Q/A session

We had interesting discussions after the talks of last year, so we hope 
that this format will work well again.

## Key dates

* Submission deadline: 23 December 2021
* Announcement of selected talks: 31 December 2021
* Deadline for the pre-recorded talks: Around January 15, 2022
* Conference dates 5 & 6 February 2022 **(online)**
* Hardware-Aided Trusted Computing devroom date: Saturday 5 February 
2022 **(online)**

## Submit a talk proposal

Submissions are required to proceed through the [FOSDEM 2022 Pentabarf 
website](https://penta.fosdem.org/submission/FOSDEM22). If you do not 
know how to use Pentabarf yet, you can [read a beginner's guide 
here](https://medium.com/@maartjeme/beginners-guide-to-pentabarf-78808a1ce5bf).

Your submission must include the following information:

* Your contact email.
* The title (and possible subtitle) of your talk: please be descriptive, 
as the audience will have to choose to attend your talk out of a listing 
with ~500 talks from other projects at FOSDEM.
* Select "Hardware-Aided Trusted Computing devroom" as the track.
* A short abstract of one paragraph.
* A longer description if you wish to do so.
* Links to related websites / blogs etc.

You should target a talk duration of 20 minutes (pre-recorded) with 5 
mins of live Q&A (leaves us with 5 mins change over for talks).

## Contact and organizers

* Main organizer: Fritz Alder (fritz.alder at cs.kuleuven.be)
* Devroom URL on the FOSDEM website: 
<https://fosdem.org/2022/schedule/track/hardware_aided_trusted_computing/>
* The devroom is supported by the [Confidential Computing 
Consortium](https://confidentialcomputing.io/).

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.fosdem.org/pipermail/fosdem/attachments/20211206/8d3bed0a/attachment-0001.html>


The content of all messages is the sole responsibility of the author.
More information about the FOSDEM mailing list