Linaro Connect resources will be available here during and after Connect!
Booking Private Meetings Private meetings are booked through bkk19.skedda.com and your personal calendar (i.e. Google Calendar). View detailed instructions here.
For Speakers Please add your presentation to Sched.com by attaching a pdf file to your session (under Extras > + File). We will export these presentations daily and feature on the connect.linaro.org website here. Videos will be uploaded as we receive them (if the video of your session cannot be published please let us know immediately by emailing connect@linaro.org).
Puzzle: Dave Pigott has come up with another puzzle: https://linaro.co/bkk19puzzle can you crack the code?! Prizes will be awarded to the winner(s) on Friday.
This is a general talk covering various topics and features that Security Working Group has been working with since the previous Connect. I.e., expect to hear more about the current status and what the future plan is for various topics.
Joakim has been a Linux user for almost 20 years where he spent most of the time in his professional career working with security for embedded devices. The last ten years he has been at Linaro, where he was heading Security Working Group who are working with various upstream projects... Read More →
In this talk we are going to look into what it means to run a TEE in a TPM and answer questions like, what are the benefits and what the trade-offs when you are running a software based TPM in a TEE as a firmware TPM. For the second part of the talk we intend to have a more open discussion with the audience, where we want to discuss use cases and what kind changes that are necessary in boot components to be able talk to software based TPM instead of a real TPM.
Joakim has been a Linux user for almost 20 years where he spent most of the time in his professional career working with security for embedded devices. The last ten years he has been at Linaro, where he was heading Security Working Group who are working with various upstream projects... Read More →
Recently up-streamed changes to OP-TEE allow a board-port to provide a DTB overlay in-memory to be merged into a main DTB by a later boot phase. This would be a brief description of how that works and why you might want to consider it for your project.
Debugging trusted applications (and OP-TEE itself) can be difficult because, for very good reasons, secure software is often reluctant to disclose information about its operation to the non-secure world, meaning is does not have access to the rich facilities in operating systems such as GNU/Linux that would normally be used for system level debug.
In this session we will discuss the common debug techniques used to debug secure applications. We will also look at how it is possible to implement function tracing to help solve problems, especially on platforms where JTAG debug is unavailable.
Currently working as part of Support and Solutions team, Linaro. Responsible for activities related to platform security like OP-TEE, trusted firmware, boot-loaders etc. Also responsible for tool-chain support activities.Contributed in various open source projects like OP-TEE, TF-A... Read More →