XMLWordPrintable

    • Icon: Group Group
    • Resolution: Unresolved
    • Icon: Medium Medium
    • None

      There is a growing need for a Zero-Trust architecture in HW, where a software application can both examine and attest to the environment it is running in, and have guarantees that it is isolated from other, untrusted software. The Trusted Computing SIG will examine the state of the art for hardware-assisted technologies such as Confidential Computing, Remote Attestation, Confidential VM, Hardware TEE, Enclaves, etc., on an ongoing basis,  and define the trusted computing strategy for RISC-V. It will develop TG Charters as required, that will define the required written documentation, threat models, executable model, prototype implementations including SW PoCs, toolchain support, and compliance suite for RISC-V trusted execution recommendations and extensions.

      Leadership History

      Period Chair Vice-Chair
      2023-2024 Ravi Sahita <ravi@rivosinc.com> Suresh Sugumar <suresh.sugumar@gmail.com>

            rlsahita Ravi Sahita
            rsene Rafael Sene
            Votes:
            0 Vote for this issue
            Watchers:
            2 Start watching this issue

              Created:
              Updated: