Loading…
Linaro Connect resources will be available here during and after Connect!

Booking Private Meetings
Private meetings are booked through bkk19.skedda.com and your personal calendar (i.e. Google Calendar). View detailed instructions here.

For Speakers
Please add your presentation to Sched.com by attaching a pdf file to your session (under Extras > + File). We will export these presentations daily and feature on the connect.linaro.org website here. Videos will be uploaded as we receive them (if the video of your session cannot be published please let us know immediately by emailing connect@linaro.org).

Puzzle: 
Dave Pigott has come up with another puzzle: https://linaro.co/bkk19puzzle can you crack the code?! Prizes will be awarded to the winner(s) on Friday.




Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

Security [clear filter]
Monday, April 1
 

4:00pm GMT+07

BKK19-117 Security WG Lightning talks
This is a general talk covering various topics and features that Security Working Group has been working with since the previous Connect. I.e., expect to hear more about the current status and what the future plan is for various topics.

Speakers
avatar for Joakim Bech

Joakim Bech

Distinguished Engineer, Linaro
Joakim has been a Linux user for almost 20 years where he spent most of the time in his professional career working with security for embedded devices. The last ten years he has been at Linaro, where he was heading Security Working Group who are working with various upstream projects... Read More →
avatar for Jerome Forissier

Jerome Forissier

Senior Engineer, Linaro
.
avatar for Jens Wiklander

Jens Wiklander

Senior Software Engineer, Linaro
Senior Software Engineer in Linaro Security Working Group


Monday April 1, 2019 4:00pm - 4:25pm GMT+07
Keynote Room (World Ballroom BC)
 
Tuesday, April 2
 

8:30am GMT+07

BKK19-215 TPM in TEE
In this talk we are going to look into what it means to run a TEE in a TPM and answer questions like, what are the benefits and what the trade-offs when you are running a software based TPM in a TEE as a firmware TPM. For the second part of the talk we intend to have a more open discussion with the audience, where we want to discuss use cases and what kind changes that are necessary in boot components to be able talk to software based TPM instead of a real TPM.

Speakers
avatar for Joakim Bech

Joakim Bech

Distinguished Engineer, Linaro
Joakim has been a Linux user for almost 20 years where he spent most of the time in his professional career working with security for embedded devices. The last ten years he has been at Linaro, where he was heading Security Working Group who are working with various upstream projects... Read More →


Tuesday April 2, 2019 8:30am - 9:20am GMT+07
Session Room 3 (Lotus 10)
 
Thursday, April 4
 

8:30am GMT+07

BKK19-403 Using DTB overlays in OP-TEE
Recently up-streamed changes to OP-TEE allow a board-port to provide a DTB overlay in-memory to be merged into a main DTB by a later boot phase.
This would be a brief description of how that works and why you might want to consider it for your project.

Speakers
avatar for Bryan O'Donoghue

Bryan O'Donoghue

Engineer, Linaro
Embedded developer, Linux, u-boot, zephyr, ATF, OP-TEE.Linaro member services.



Thursday April 4, 2019 8:30am - 8:55am GMT+07
Session Room 1 (Lotus 1-2)

12:00pm GMT+07

BKK19-415 OP-TEE: Shared memory between TAs
This session will cover how the recently added feature with Trusted Application shared memory works.

With this TAs can share of read-only code pages allowing efficient memory usage with several instances of the same TA or a common shared library.

Speakers
avatar for Jens Wiklander

Jens Wiklander

Senior Software Engineer, Linaro
Senior Software Engineer in Linaro Security Working Group



Thursday April 4, 2019 12:00pm - 12:25pm GMT+07
Keynote Room (World Ballroom BC)

12:30pm GMT+07

BKK19-419 Debugging with OP-TEE
Debugging trusted applications (and OP-TEE itself) can be difficult because, for very good reasons, secure software is often reluctant to disclose information about its operation to the non-secure world, meaning is does not have access to the rich facilities in operating systems such as GNU/Linux that would normally be used for system level debug.

In this session we will discuss the common debug techniques used to debug secure applications. We will also look at how it is possible to implement function tracing to help solve problems, especially on platforms where JTAG debug is unavailable.

Speakers
avatar for Sumit Garg

Sumit Garg

Senior Engineer, Linaro
Currently working as part of Support and Solutions team, Linaro. Responsible for activities related to platform security like OP-TEE, trusted firmware, boot-loaders etc. Also responsible for tool-chain support activities.Contributed in various open source projects like OP-TEE, TF-A... Read More →



Thursday April 4, 2019 12:30pm - 12:55pm GMT+07
Keynote Room (World Ballroom BC)
 
Friday, April 5
 

11:30am GMT+07

BKK19-513 TF-A: Dynamic Configuration and PIE support
This is a presentation on Dynamic Configuration and the associated Position Independent Executable Support (PIE) in Trusted Firmware-A (TF-A).

SFO17 had a BoF session (by Dan Handley) to discuss the implementation plan for dynamic configuration in firmware. General agreement was that this is a good feature to do and some of the envisaged use-cases were: 
* Dynamic config of secure firmware features
* Dynamic firmware config using hardware configuration, security policies
* Modification of hardware configuration as seen by other software
* Centralized static firmware configuration etc

The presentation will focus on the implementation of dynamic configuration and how it can be utilized by TF-A partners. Some illustrations wherein ARM platforms dynamically configure the firmware for functionality and memory savings will also be provided.

Position Independent Executable (PIE) support for TF-A has been a long pending request from TF-A partners. The presentation will describe the technical details on how this feature was implemented in AArch64 version of TF-A. It will also cover some limitations of the implemented `dynamic relocation fixup` code.

Speakers
avatar for Soby Mathew

Soby Mathew

Principal Software Engineer, Arm Ltd
Tech Lead of TF-RMM project and one of the maintainers of Trusted Firmware-A.



Friday April 5, 2019 11:30am - 11:55am GMT+07
Keynote Room (World Ballroom BC)
 


Twitter Feed

Filter sessions
Apply filters to sessions.
  • 96Boards
  • Android
  • Arm on Arm
  • Automotive
  • Big Data
  • Boot Architecture
  • Data Center
  • Food & Beverage
  • HPC
  • Informational
  • IoT and Embedded
  • IoT Fog/Gateway/Edge Computing
  • Keynote
  • Linux Kernel
  • Machine Learning/AI
  • Multimedia
  • Networking
  • Open Source Development
  • Power Management
  • Security
  • Tools
  • Validation and CI