Tech: Trusted Computing Special Interest Group

There is a growing need for a Zero-Trust architecture in HW, where a software application can both examine and attest to the environment it is running in, and have guarantees that it is isolated from other, untrusted software. The Trusted Computing SIG will examine the state of the art for hardware-assisted technologies such as Confidential Computing, Remote Attestation, Confidential VM, Hardware TEE, Enclaves, etc., on an ongoing basis,  and define the trusted computing strategy for RISC-V. It will develop TG Charters as required, that will define the required written documentation, threat models, executable model, prototype implementations including SW PoCs, toolchain support, and compliance suite for RISC-V trusted execution recommendations and extensions.

Group Information

  • 96 Members
  • 22 Topics, Last Post:
  • Started on
  • Feed

Group Email Addresses

Group Settings

  • This is a subgroup of main.
  • All members can post to the group.
  • Posts to this group do not require approval from the moderators.
  • Messages are set to reply to group.
  • Subscriptions to this group do not require approval from the moderators.
  • Archive is visible to anyone.
  • Members can edit their messages.
  • Members can set their subscriptions to no email.

Top Hashtags [See All]

No used hashtags.

Log In If You Are Already A Member

Message History