[FOSDEM] Call for Participation: Confidential Computing devroom @ FOSDEM 2025

Fritz Alder fritz.alder.work at gmail.com
Wed Oct 30 18:32:10 UTC 2024


A web version of this CFP is available at: https://falder.org/fosdem25-cfp

# Confidential Computing devroom @ FOSDEM 2025

Following the success of [last years' 
editions](https://archive.fosdem.org/2024/schedule/track/confidential-computing/), 
we are for the 6th time organizing a devroom devoted to the emerging 
open-source ecosystem around *hardware-based Trusted Execution 
Environments (TEEs)*, which nowadays is also known under the term 
*confidential computing*.

Confidential computing leverages hardware-based TEEs in order to protect 
and secure data in-use. This devroom is devoted to this emerging free 
and open-source ecosystem around TEEs that allow to directly isolate and 
attest trusted "enclave" software components running on top of a 
potentially compromised operating system. Over the last years, all major 
processor vendors have developed some form of TEE support, e.g.,

* ARM TrustZone, Morello & Confidential Computing Architecture (CCA)
* AMD Secure Encrypted Virtualization (SEV) & SEV-ES/SEV-SNP extensions
* IBM Secure Execution for Linux on Z (SEL).
* Intel Software Guard Extensions (SGX) and Trust Domain Extensions (TDX)
* NVIDIA H100 GPUs

Hence, with today's mainstream consumer hardware being increasingly 
shipped with these advanced trusted computing technologies, this devroom 
wants to foster discussion on the much-needed free and open-source TEE 
ecosystem amongst industry players, academics, enthusiasts, hobbyists, 
and project maintainers.


## Desirable topics

The devroom's topics of interest include, but are not limited to:

* Open-source confidential computing.
* An introduction to the existing solutions and the use cases they 
cover, etc.
* Programming frameworks for TEEs: how to develop free and open-source
   software that can run inside enclaves (e.g., library OSs, SDKs, Linux
   kernel support, etc.).
* Confidential computing deployment: Challenges and benefits.
* Use cases and applications on top of TEEs such as applying
   confidential computing to the Cloud Native space.
* Compiler and language support for emerging trusted hardware extensions.
* Open-source enclave processor designs (e.g., RISC-V TEEs).
* Attestation, focusing on Confidential Computing (see note below)
* Existing technologies:
    * What do they have in common, how do they differ?
    * Which confidential computing use cases can they cover?
* Upcoming technologies:
    * TEEs on accelerators (GPUs, NPUs, DPUs, etc)
    * Interaction between existing and upcoming technologies
    * Opportunities
* Vision: future TEEs (what is missed, proposals, wishes, discussions).
* TEE-specific attacks and defenses: reverse engineering, side-channels,
   vulnerabilities, exploits.

## This year's changes

As there's a dedicated [attestation 
devroom](https://fosdem.org/2025/schedule/track/attestation/), we 
encourage topics related to
attestation that do not relate to general confidential computing to be
submitted there.

Please note that we do **not** allow remote speakers this year anymore. 
All speakers need to commit to be at FOSDEM in-person on February 1, 
2025 in Brussels, Belgium.

## Key dates (Brussels time)

* Submission deadline: December 1, 2024
* Announcement of selected talks: December 15, 2024 or earlier
* FOSDEM dates February 1 & 2, 2025
* Confidential computing devroom date: February 1, 2025, 9am-1pm

## Submit a talk proposal

Submissions are required to proceed through the [new and updated FOSDEM
2025 system](https://pretalx.fosdem.org/fosdem-2025/cfp).

Your submission must include the following information:

* Proposal title of your talk: please be descriptive, as the audience
will have to choose to attend your talk out of a listing with ~500 talks
from other projects at FOSDEM.
* Select "Confidential computing devroom" as the track.
* A longer description if you wish to do so.
* A short abstract of one paragraph.
* Submission notes to let us know of specifics to your talk.
* Additional speakers if you want to add them.
* FOSDEM requires you to fill in which open-source license you use and
to provide links to your source code. *All our talks at FOSDEM **must** be
about free and open-source software, so please make it clear to the
organizers by providing a public URL to the source code of the relevant
project(s).In case the URL is not yet public, please indicate so and
explicitly clarify your commitment to have the code available the latest
at the time of the devroom.*
* Information about yourself.

We target a block of **20 minutes** per talk (*including* ~5 minutes of 
Q&A).

If you wish to only give a shorter talk, you can let us know in the
submission notes. We leave the option open to have several **10 minute**
talks for rapid-fire ideas and discussion points. Let us know in the
submission notes if you plan your submission to be more interactive so
that we can plan in more time for discussion after your talk.

## Useful links

* [FOSDEM 2025 website](https://fosdem.org/2025/)
* [FOSDEM 2024 Confidential Computing 
devroom](https://archive.fosdem.org/2024/schedule/track/confidential-computing/) 

* [FOSDEM 2023 Confidential Computing 
devroom](https://archive.fosdem.org/2023/schedule/track/confidential_computing/) 

* [FOSDEM 2022 Hardware-Aided Trusted Computing 
devroom](https://archive.fosdem.org/2022/schedule/track/hardware_aided_trusted_computing/) 

* [FOSDEM 2021 Hardware-Aided Trusted Computing 
devroom](https://archive.fosdem.org/2021/schedule/track/hardware_aided_trusted_computing/) 

* [FOSDEM 2020 Hardware-Aided Trusted Computing 
devroom](https://archive.fosdem.org/2020/schedule/track/hardware_aided_trusted_computing/) 


## Contact and organizers

If you have any questions, feel free to reach out to the whole organizer 
team under mailto:confidential-devroom-manager at fosdem.org or reach an 
individual organizer below:

* Organizers:
   * [Fabiano Fidêncio](mailto:fabiano at fidencio.org)
   * [Fritz Alder](mailto:fritz.alder.work at gmail.com)
   * [Ilaria Battiston](mailto:ilaria.battiston at cwi.nl)
   * [Jo Van Bulck](mailto:jo.vanbulck at kuleuven.be)
   * [Steffen Eiden](mailto:fosdem at eiden.de)
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.fosdem.org/pipermail/fosdem/attachments/20241030/086cb48d/attachment.html>


More information about the FOSDEM mailing list