50:08 Enabling Hardware Security Modules for Confidential Computing - Reinhard Buendgen, IBM The Linux Foundation
36:22 Hiding Attestation with Linux Keyring in Confidential Virtual Machines - Mikko Ylinen, Intel The Linux Foundation
52:07 Enabling New Security Frontiers: Deep-Dive Into Implementing Confidential Computing on RISC-V - R... The Linux Foundation
1:09:24 The Critical Path to Implant Backdoors and Potential Mitigation Techniques: Learnings from XZ... The Linux Foundation
27:43 Compartmentalizing Vulnerable Kernel Components Without Stopping the Machine - Qinrun Dai The Linux Foundation
47:29 Restricting Unprivileged User Namespaces in Ubuntu - John Johansen & Maxime Bélair, Canonical The Linux Foundation
23:49 Verifying and Signing EBPF Programs with Inspektor Gadget - Francis Laniel, Microsoft The Linux Foundation
9:59 Safer Seccomp: Dead Syscalls Elimination - Yuan Tan & Siqi Fan, Lanzhou University; Xiao Liu The Linux Foundation