| Kite - Bootstrap Admin Template

Linaro Connect 2025

Talks

Confidential compute


Filters
Reset

14th May

No talks scheduled for this date.

15th May

Technical presentation - 30 minutes (including q&a)

Confidential compute

Thursday, 11:00 - 11:25

As Web3 adoption accelerates, robust security measures are essential to safeguarding user assets and data. The Apache Teaclave TrustZone SDK, the recommended Rust SDK for OP-TEE, provides a memory-safe framework for developing Trusted Applications. Beyond

Profile Picture
Zhaofeng Chen
Principle Security Researcher at CertiK

Technical presentation - 30 minutes (including q&a)

Confidential compute

Thursday, 12:00 - 12:25

UADK(User-space Acceleration Development Kit) is an open-source framework designed to offload compute-intensive cryptographic algorithms to hardware accelerators. By integrating UADK with ARM cVMs, we enable hardware-accelerated cryptographic operations t

Profile Picture
Guangwei Zhou
Senior Engineer, Huawei at Huawei Technologies Co., Ltd.

Technical presentation - 30 minutes (including q&a)

Confidential compute

Thursday, 14:00 - 14:25

Attested TLS is an essential ingredient of any confidential computing solution. In this talk, we explore the design space and the corresponding typical security and performance tradeoffs of attested TLS protocols. We also summarize the standardization eff

Profile Picture
Muhammad Usama Sardar
Research Associate at TU Dresden

Technical presentation - 30 minutes (including q&a)

Confidential compute

Thursday, 14:30 - 14:55

Device Assignment (DA) is the method which allows a device to be uniquely assigned to an individual Realm, and to allow the Realm to attest the device before granting it access to the Realm’s contents. This session will cover the overview of Device

Profile Picture
Arunachalam Ganapathy
Staff Software Engineer at Arm

Technical presentation - 30 minutes (including q&a)

Confidential compute

Thursday, 15:00 - 15:25

Device assignment in Confidential Virtual Machines (CVMs) enables applications such as confidential machine learning and enhances CVM I/O performance. Current development relies on TDISP, which lacks support for devices available on the market. In this ta

Profile Picture
Yongzheng Wu
Senior Researcher at Huawei International
Profile Picture
Yier Jin
Chief Scientist of Trusted Computing Lab at Huawei

Technical presentation - 30 minutes (including q&a)

Confidential compute

Thursday, 15:30 - 15:55

With AI models handling sensitive data, security must extend beyond data protection at rest and in transit to also protect data during execution. Arm Confidential Compute Architecture (CCA) introduces Realm Virtual Machines (Realm VMs) that provides a tru

Profile Picture
Shefali Kamal
Software Engineering Manager at Fujitsu

16th May

Keynote

Confidential compute

Friday, 09:20 - 09:35

With Arm9 came CCA Realms, and with CCA, Confidential Computing comes to the Arm ecosystem.  CCA allows Trusted Execution Environments (TEEs), providing hardware-based isolation for applications and, with attestation services, further security assura

Profile Picture
Mike Bursell
Executive Director at Confidential Computing Consortium

Technical presentation - 30 minutes (including q&a)

Confidential compute

Friday, 11:10 - 11:35

The Arm Confidential Compute Architecture (Arm CCA) builds on top of the Armv9-A Realm Management Extension (RME) by providing a reference security architecture and open-source implementation of hypervisor-based confidential computing. This talk describes

Profile Picture
Dan Handley
Fellow at Arm

Technical presentation - 30 minutes (including q&a)

Confidential compute

Friday, 11:40 - 12:05

The first part of this presentation will provide an update on the work done by Linaro, Arm and community members over the past year to support confidential computing on Arm platforms.  From there we will outline our plans for the coming year in areas su

Profile Picture
Poirier Mathieu
Kernel Engineer at Linaro

Technical presentation - 30 minutes (including q&a)

Confidential compute

Friday, 12:40 - 13:05

The TF-RMM is a firmware component that runs at Realm EL2 and forms part of a system which implements the Arm Confidential Compute Architecture (Arm CCA). This talk discuses the EL0 app framework which allows to deprivilege parts of RMM to run in a separa

Profile Picture
Soby Mathew
Principal Software Engineer at ARM Ltd