lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <YLjsd7zskBPaN9C6@8bytes.org>
Date:   Thu, 3 Jun 2021 16:51:35 +0200
From:   Joerg Roedel <joro@...tes.org>
To:     linux-kernel@...r.kernel.org, linux-coco@...ts.linux.dev,
        kvm@...r.kernel.org, virtualization@...ts.linux-foundation.org
Cc:     Andi Kleen <ak@...ux.intel.com>, Andy Lutomirski <luto@...nel.org>,
        Borislav Petkov <bp@...en8.de>,
        Brijesh Singh <brijesh.singh@....com>,
        David Kaplan <David.Kaplan@....com>,
        David Rientjes <rientjes@...gle.com>,
        Joerg Roedel <jroedel@...e.de>,
        Jun Nakajima <jun.nakajima@...el.com>,
        "Kirill A. Shutemov" <kirill.shutemov@...ux.intel.com>,
        Paolo Bonzini <pbonzini@...hat.com>,
        Peter Zijlstra <peterz@...radead.org>,
        Sathya Kuppuswamy <sathyanarayanan.kuppuswamy@...el.com>,
        Sean Christopherson <seanjc@...gle.com>,
        Tom Lendacky <thomas.lendacky@....com>
Subject: [CFP LPC 2021] Confidential Computing Microconference

Hi,

I am pleased to announce that the

	Confidential Computing Microconference[1]
	
has been accepted at this years Linux Plumbers Conference.

In this microconference we will discuss how Linux can support encryption
technologies which protect data during processing on the CPU. Examples
are AMD SEV, Intel TDX, IBM Secure Execution for s390x and ARM Secure
Virtualization.

Suggested Topics are:

	- Live Migration of Confidential VMs
	- Lazy Memory Validation
	- APIC emulation/interrupt management
	- Debug Support for Confidential VMs
	- Required Memory Management changes for memory validation
	- Safe Kernel entry for TDX and SEV exceptions
	- Requirements for Confidential Containers
	- Trusted Device Drivers Framework and driver fuzzing
	- Remote Attestation

Please submit your proposals on the LPC website at:

	https://www.linuxplumbersconf.org/event/11/abstracts/#submit-abstract

Make sure to select "Confidential Computing MC" in the Track pulldown
menu.

Looking forward to seeing you all there! :)

Thanks,

	Joerg Roedel
	
[1] https://www.linuxplumbersconf.org/blog/2021/index.php/2021/05/14/confidential-computing-microconference-accepted-into-2021-linux-plumbers-conference/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ