Online / 6 & 7 February 2021

visit

D.hardware.trusted


DayStartEndTrack(s)
Saturday10:0018:00Hardware-Aided Trusted Computing
09101112131415161718
SaturdayOpening
Welcome, overview, lineup
Rust, WebAssembly and open source
Enarx design choices
Veracruz: privacy-preserving collaborative computeGraphene Library OS
Running unmodified applications in SGX enclaves
Secure Multi-Party Applications in Open EnclaveLightning fast enclave network services with async I/OAn Open-Source Framework for Developing Heterogeneous Distributed Enclave ApplicationsHardwared Based CPU Undervolting on The Cheap
Stealing Your Secrets for $30
Exploiting Interfaces of SEV-ES-protected Virtual MachinesOverview of Secure Boot state in the ARM-based SoCsPenglai Enclave: Verifiable and Scalable RISC-V TEE SystemKeystone: towards an open standard for trusted execution environmentsTEEP (Trusted Execution Environment Provisioning) Implementation on RISC-V
Introduction of TEEP and implementation on RISC-V
Trusted RV: 64bit RISC-V TEE with Secure CoProcessor as Root of TrustCheriBSD
A memory safe POSIX OS
Hardware-Aided Trusted Computing in High-Level Synthesis (HLS) for FPGAsCubicleOS -- when Hardware helps to partition software

Events

TitleTrackStartEnd

Saturday

 Opening
Welcome, overview, lineup
Hardware-Aided Trusted Computing10:0010:05
 Rust, WebAssembly and open source
Enarx design choices
Hardware-Aided Trusted Computing10:0510:30
 Veracruz: privacy-preserving collaborative computeHardware-Aided Trusted Computing10:3010:55
 Graphene Library OS
Running unmodified applications in SGX enclaves
Hardware-Aided Trusted Computing10:5511:20
 Secure Multi-Party Applications in Open EnclaveHardware-Aided Trusted Computing11:2011:45
 Lightning fast enclave network services with async I/OHardware-Aided Trusted Computing11:4512:10
 An Open-Source Framework for Developing Heterogeneous Distributed Enclave ApplicationsHardware-Aided Trusted Computing12:1012:35
 Hardwared Based CPU Undervolting on The Cheap
Stealing Your Secrets for $30
Hardware-Aided Trusted Computing13:3013:55
 Exploiting Interfaces of SEV-ES-protected Virtual MachinesHardware-Aided Trusted Computing13:5514:20
 Overview of Secure Boot state in the ARM-based SoCsHardware-Aided Trusted Computing14:2014:45
 Penglai Enclave: Verifiable and Scalable RISC-V TEE SystemHardware-Aided Trusted Computing15:0015:25
 Keystone: towards an open standard for trusted execution environmentsHardware-Aided Trusted Computing15:2515:50
 TEEP (Trusted Execution Environment Provisioning) Implementation on RISC-V
Introduction of TEEP and implementation on RISC-V
Hardware-Aided Trusted Computing15:5016:15
 Trusted RV: 64bit RISC-V TEE with Secure CoProcessor as Root of TrustHardware-Aided Trusted Computing16:1516:40
 CheriBSD
A memory safe POSIX OS
Hardware-Aided Trusted Computing16:5017:15
 Hardware-Aided Trusted Computing in High-Level Synthesis (HLS) for FPGAsHardware-Aided Trusted Computing17:1517:40
 CubicleOS -- when Hardware helps to partition softwareHardware-Aided Trusted Computing17:4018:00