| Kite - Bootstrap Admin Template

Linaro Connect 2025

Talks

Security


Filters
Reset

14th May

Keynote

Security

Wednesday, 09:50 - 10:05

Open Source is pervasive and has come to dominate the embedded market, as well as laptops, servers and clouds. The embedded space however includes products like automobiles, medical devices, planes, etc.  where safety is a consideration.   Over

Profile Picture
Kate Stewart
VP Dependable Embedded Systesm at The Linux Foundation

Technical presentation - 30 minutes (including q&a)

Security

Wednesday, 12:00 - 12:25

Introduces Linaro Trusted Substrate (TS) Arm SystemReady/UEFI firmware and Trusted Reference Stack (TRS) kernel, initramfs and rootfs prototype for secure boot with TPM for secure storage. Discusses upstreaming status, problems and solutions. Linaro ha

Profile Picture
Mikko Rapeli
Senior Engineer at Linaro

Technical presentation - 30 minutes (including q&a)

Security

Wednesday, 16:30 - 16:55

This talk presents ongoing work at Arm to implement an fTPM SP in Trusted Services. The first functional version of the SP is already public. It implements the DEN0138 TPM CRB over FF-A specification as the communication layer. It contains the ms-20-tpm-r

Profile Picture
Balint Dobszay
Senior Software Engineer at Arm

15th May

Keynote

Security

Thursday, 09:35 - 09:50

The FIDO Alliance’s FIDO Device Onboard (FDO) specification is an automatic onboarding protocol for edge nodes and IoT devices. It installs secrets and configuration data to securely connect devices with cloud and edge platforms. FDO's key benefits inc

Profile Picture
Richard Kerslake
Market Development Manager at FIDO Alliance

Technical presentation - 30 minutes (including q&a)

Security

Thursday, 12:30 - 12:55

Attestation is a process designed to establish trust in an entity by authenticating and verifying that the device has booted into a known, secure state. Building trust is a critical requirement in various use cases, such as device onboarding and the deplo

Profile Picture
Tamas Ban
Principal Software Engineer at Arm

Technical presentation - 30 minutes (including q&a)

Security

Thursday, 15:00 - 15:25

The Runtime Security Engine (RSE) has emerged as a crucial component in modern security architectures, serving as a hardware root-of-trust and an isolated attestation enclave for A-profile compute subsystems. As computing environments evolve to support Co

Profile Picture
Shebu Varghese Kuriakose
Director, Software Technology Management at Arm
Profile Picture
Raef Coles
Staff Software Engineer at Arm Limited

16th May

Panel discussion - 40 minutes

Security

Friday, 10:10 - 10:50

Join us as we bring together renowned experts in cybersecurity regulations, supply chain challenges and confidential computing technologies to navigate the dynamic interplay of these critical domains. Evolving digital landscapes and escalating threats imp

Profile Picture
Joakim Bech
Distinguished Engineer at Linaro
Profile Picture
Kate Stewart
VP Dependable Embedded Systesm at The Linux Foundation
Profile Picture
Marta Rybczynska
Founder at Ygreky
Profile Picture
Mike Bursell
Executive Director at Confidential Computing Consortium

Technical presentation - 30 minutes (including q&a)

Security

Friday, 10:40 - 11:05

Hafnium is the reference implementation as the Secure Partition Manager (SPM), designed specifically for Arm Cortex-A processors that operate within TrustZone's secure environment at the Secure EL2 exception level. Its main role is to manage and secure is

Profile Picture
Madhukar Pappireddy
Staff Software Engineer at Arm

Technical presentation - 30 minutes (including q&a)

Security

Friday, 11:40 - 12:05

The Trusted Firmware open source community project is now the mature and established collaborative platform around secure software development for Armv8-A, Armv9-A and Armv8-M based products. The session will cover recent project milestones, introduce new

Profile Picture
Matteo Carlini
Director, Software Technology Management at Arm
Profile Picture
Shebu Varghese Kuriakose
Director, Software Technology Management at Arm

Technical presentation - 30 minutes (including q&a)

Security

Friday, 12:40 - 13:05

Return Oriented Programming (ROP) is a powerful technique where attackers divert a program by modifying a function's return address. Then by returning through a chain of code snippets found in the binary ("gadgets") they can make programs behave malicious

Profile Picture
David Spickett
Principal Software Engineer at Arm