Filter talks by category:

Enabling New Security Frontiers: Deep-dive into implementing Confidential Computing on RISC-V

This session aims to cover ISA and non-ISA for Confidential VM Environment (CoVE) on RISC-V platforms. The session will describe the use of ratified RISC-V privileged ISA extensions and new…

Shrinking The Elephant: A Confidential Computing Attestation Sequel

At the 2022 confidential computing LPC microconference, we talked about the elephant in the confidential computing room: guest attestation and verification. We showed how opaque, fragmented and closed this essential…

Towards Scalable Confidential Computing on RISC-V

This session aims to cover RISC-V proposed architecture for Confidential VM Environment (CoVE) using ratified RISC-V privileged ISA extensions and proposed new ISA extensions. This session will describe the ongoing…

Confidential Computing for RISC-V-based Platforms

Confidential computing aims to protect data in use on computing platforms. To achieve the goals of confidential computing, RISC-V platforms must provide a hardware-rooted, attested TCB that is able to…