Talks
Open Source is pervasive and has come to dominate the embedded market, as well as laptops, servers and clouds. The embedded space however includes products like automobiles, medical devices, planes, etc. where safety is a consideration. Over
The Trusted Firmware open source community project is now the mature and established collaborative platform around secure software development for Armv8-A, Armv9-A and Armv8-M based products. The session will cover recent project milestones, introduce new
Introduces Linaro Trusted Substrate (TS) Arm SystemReady/UEFI firmware and Trusted Reference Stack (TRS) kernel, initramfs and rootfs prototype for secure boot with TPM for secure storage. Discusses upstreaming status, problems and solutions. Linaro has i
This talk presents ongoing work at Arm to implement an fTPM SP in Trusted Services. The first functional version of the SP is already public. It implements the DEN0138 TPM CRB over FF-A specification as the communication layer. It contains the ms-20-tpm-r
The FIDO Alliance’s FIDO Device Onboard (FDO) specification is an automatic onboarding protocol for edge nodes and IoT devices. It installs secrets and configuration data to securely connect devices with cloud and edge platforms. FDO's key benefits incl
Attestation is a process designed to establish trust in an entity by authenticating and verifying that the device has booted into a known, secure state. Building trust is a critical requirement in various use cases, such as device onboarding and the deplo
The Runtime Security Engine (RSE) has emerged as a crucial component in modern security architectures, serving as a hardware root-of-trust and an isolated attestation enclave for A-profile compute subsystems. As computing environments evolve to support Co
Join us as we bring together renowned experts in cybersecurity regulations, supply chain challenges and confidential computing technologies to navigate the dynamic interplay of these critical domains. Evolving digital landscapes and escalating threats imp
Return Oriented Programming (ROP) is a powerful technique where attackers divert a program by modifying a function's return address. Then by returning through a chain of code snippets found in the binary ("gadgets") they can make programs behave malicious