Akihiko Odaki, a Ph.D. candidate at the University of Tokyo, is passionate about designing faster processors. His research focuses on processor microarchitecture, specifically using QEMU to analyze RISC-V programs and optimize processor designs for their execution speed.
He is also a software engineer at Daynix Computing, Ltd., and his contribution to the development of the TCG plugin’s register reading feature was supported by the company. His primary focus at the company is QEMU's networking subsystem. Notably, he is the maintainer of igb, a critical component that emulates an Intel network interface card with advanced virtualization capabilities. Akihiko's interests extend beyond networking and include macOS support, Asahi Linux (a port of Linux for Apple Silicon) support, and para-virtualized graphics.
- TCG Plugin in Practice: A Case of Microarchitecture Research
- Unleashing SR-IOV on Virtual Machines
I am a full-time low-level/embedded Linux developer with 16 years of experience. I am also an occasional open-source contributor. For the past 10 years, I have been building and maintaining various multimedia pipelines. Over the last 4 years, I have been developing a virtio-video device and the draft open-source driver, focusing on automotive and software-defined vehicles (SDV).
- Unwrapping virtio-video
Alexander currently works at AWS and is responsible for the Nitro Hypervisor. Previously, he worked on QEMU, KVM, openSUSE / SLES on ARM and U-Boot. Whenever something really useful comes to his mind, he implements it. Among others he did Mac OS X virtualization using KVM, nested SVM, KVM on PowerPC, a lot of work in QEMU for openSUSE on ARM and the UEFI compatibility layer in U-Boot.
- Empowering confidential VMs in the cloud to use their own firmware upon instantiation.
Long time systems and embedded developer with a side of Dynamic Binary Translation.
Alex started learning to program in the 80s in an era of classic home computers that allowed you to get down and dirty at the system level. After graduating with a degree in Chemistry he's worked on a variety of projects including Fruit Machines, Line Cards, CCTV recorders and point-to-multipoint wireless microwave systems. Since the turn of the century his primary focus has been working with FLOSS platforms, especially Linux. An alumni of Transitive he has a broad experience of cross-platform virtualization as well as a strong background in telecommunications and networking. A keen Emacs user he will happily answer questions and proselytise for the One True Editor (tm).
- Oh Plugins, where are we now?
Alex is a Senior Principal Software Engineer working for Red Hat from his home in Fort Collins, Colorado. Alex is the maintainer of the VFIO subsystem in the Linux kernel and contributor to IOMMU, PCI, and KVM subsystems, as well as co-maintainer of VFIO support in QEMU.
- Unleashing VFIO's Potential: Code Refactoring and New Frontiers in Device Virtualization
Alice is a Principal Software Engineer working on KubeVirt, virtualization, and containers. She focuses mostly on storage topics but she has fun exploring all possible combinations of containers and VMs.
- VM crash investigation: Unmasking the culprits
Anirban (Ani) Sinha is a software engineer who works for Red Hat in the virtualization engineering group. His primary focus areas are Confidential computing, QEMU, KVM, libvirt and open source cloud virtualization tools like cloud-init, Microsoft WALA agent, hyperv-daemons etc. Ani is now settled in India but has previously worked in Canada for quite some time after completion of his masters program at University of BC there. Ani's Red Hat personal page is https://people.redhat.com/~anisinha/
- Empowering confidential VMs in the cloud to use their own firmware upon instantiation.
I'm Jim. I am currently pursuing my Master's degree in Computer Science at National Taiwan University. Looking forward to connecting with all of you.
- Virtualizing Arm TrustZone on KVM
Dorinda works in the Automotive team at RedHat as a Software Engineer. She has been working in the virtualization space to provide virtio devices support (virtio-sound, virtio-gpu) and developments in virtualization. Dorinda collaborates closely with RedHat developers and other experienced open source developers to design, write and test software applications.
- virtio-gpu - Where are we now?
Eric has been involved in KVM/QEMU since 2014. He works
at Red Hat, in the virtualization team. Eric has contributed
to VFIO, KVM/ARM and QEMU. He was the original contributor
of the VFIO-PLATFORM QEMU device and VFIO reset modules.
- vfio-platform: live and let die?
Fabiano Fidêncio is a clumsy code janitor who happened to work as software engineer, and has a strong passion for easing the usability of the projects he works on. He's been working on the Kata Containers project for the past 3 years, and has been involved with Confidential Containers since its embrionary stages.
- The Confidential Computing Story part II: Early development across the stack: living in stilt house
Part of the virtualization & storage team at Red Hat and virtiofsd maintainer
- The virtio-fs Kaleidoscope
Been with Red Hat since 2013, worked on the QEMU block layer, then a lot on virtio-fs.
- The virtio-fs Kaleidoscope
Bytedance Virtualization Engineer.
- The Challenges of building AI Infra on virtualization
Linux Kernel Engineer at Microsoft
- Beneath the Surface: Analyzing Nested CVM Performance on KVM/QEMU and Linux Root Partition for Microsoft Hyper-V/Cloud-Hypervisor
jsnow is perhaps best known for signing off emails with "--js" despite not really knowing how to write javascript beyond the superficial details. They have been with Red Hat and working on QEMU for over ten years, somehow.
- Solving the Sphinx's Riddle
Jörg is a long-term Linux kernel developer with a history of working on virtualisation, IOMMUs, and the X86 architecture. In the past years his focus has shifted towards Confidential Computing, where Jörg brought guest support for AMD SEV-ES into the upstream Linux kernel.
From there he moved on to initiate the COCONUT-SVSM project, which was published in March 2023 and gained a broad developer community since then.
- COCONUT-SVSM on KVM: Progress, Plans, and Challenges
Julian Stecklina is a seasoned system software developer with experience in operating systems, hypervisors and low-level system software in general. His career began around 2009, with a particular focus on microkernel-based operating systems and virtualization technologies. For the last 15 years, he has worked on all facets of virtualization-based system. Currently, he is Head of Virtualization Technology at Cyberus Technology GmbH. Besides system software, he enjoys honing his Nix skills. In his spare time, he likes to hike, run and read.
- The KVM Backend for VirtualBox
Kevin Wolf works at Red Hat as a KVM developer, with a focus on block devices. He is the maintainer of QEMU’s block subsystem and has contributed many patches to block device emulation and image format drivers. After graduating in Software Engineering at the University of Stuttgart, Germany in 2008 he worked on Xen’s block layer for a year before he started working on KVM for Red Hat in 2009.
- Practical and efficient out-of-process storage backends
Maciej S. Szmigiero is a Principal MTS in the Linux Virtualization and Security engineering team at Oracle, where he is responsible both for giving Windows guests a comfortable ride on top of KVM/QEMU virtualization stack and also for researching future guests live migration performance improvements.
Outside of work, in his (sadly limited) spare time he loves working on improving other FOSS projects, doing DIY electronics stuff, and generally reading and learning about new developments in technology and the people behind it.
- QEMU live migration device state transfer parallelization via multifd channels
Manish Mishra is a software engineer, currently working for Nutanix's Acropolis HyperVisor team. He has work experience in virtualisation and core kernel. His recent works has been around live migrations and memory management.
- UserfaultFD-based Memory Overcommitment
Markus Napierkowski is Technical Lead at Cyberus Technology GmbH, where he contributed to different low-level virtualization projects, helped build an internal hardware test automation service, and is currently responsible for the overall software engineering methodology.
- Automated hypervisor testing and benchmarking on hardware
Software Engineer at Cyberus Technology GmbH, Dresden, Saxony, Germany
- The KVM Backend for VirtualBox
Matej is an Software Engineer intern for Automotive team at RedHat. He has been working in areas surrounding virtualization, including libkrun hypervisor (virtio-net, virtio-console), and recently a vhost-user virtio-gpu implementation.
- virtio-gpu - Where are we now?
Melody works for AMD in the Linux kernel team on secure virtualization. Currently she is working on implementing alternate injection for SEV-SNP virtual machines. In the past, Melody had worked on the security of trusted execution environment, including AMD SEV series and Intel SGX. She was specializing in computer system security and privacy, including cloud computing, blockchain, and data privacy.
- Securing Interrupt Delivery for SEV-SNP Guests
Michael works on cloud performance @ Akamai as well as KVM performamce engineering for Linode customers. https://www.linkedin.com/in/mrgalaxy/
- Live Updates @ Akamai
Michael S. Tsirkin
Red Hat
Distinguished Engineer
Michael has been with Red Hat for more than 15 years. In his role as a Distinguished Engineer he acts as a chair of the Virtio Technical Committee, overseeing the development of the virtio specification for virtual devices. He also maintains several subsystems in QEMU and Linux and has over the years made multiple contributions to QEMU, Linux and KVM.
- Virtio and the chamber of secrets
Mikko is a cloud software architect at Intel’s Cloud Software Engineering team. He comes with an embedded Linux and operating systems engineering background but has most recently worked on security related topics in confidential computing/containers and cloud infrastructure. He has given presentations in Linux foundation events, such as Cloud Native Security Con NA 2022 and Confidential Computing Developer Summit ‘21. In his free time, he enjoys ultra distance sports and sailing.
- The Confidential Computing Story part II: Early development across the stack: living in stilt house
Kernel/Hypervisor engineer at Amazon EC2
- Qemu support for Windows Hypervisor Platform on Arm
I am a Senior Software Engineer with Microsoft Linux Platform Group. Before that I worked for Oracle and Sandisk. I have been working on Linux and Virtualization technologies for more than a decade. I grew up in a countryside in Bangladesh and completed my bachelor's in computer science and engineering from Bangladesh University of Engineering and Technology. Later I got my MS in computer science from Florida International University. During my free time I like to hike and do gardening.
- Beneath the Surface: Analyzing Nested CVM Performance on KVM/QEMU and Linux Root Partition for Microsoft Hyper-V/Cloud-Hypervisor
Sr. Kernel & Hypervisor engineer at AWS. Passionate about HW/SW interfaces, the Linux kernel and open-source collaboration.
- Emulating Hyper-V's Virtual Secure Mode (VSM) with QEMU and KVM
Oliver is a Software Engineer in the Virtualization Team at Red Hat, working on confidential virtualization, virtual firmware, and other boot related topics.
- Coconut-SVSM: Early attestation to unlock persistent state
- KVM Keynote
Pankaj currently work with AMD in the Confidential Compute team. Previously, worked in the field of Linux kernel & Virtualization with Red Hat.
- SNP Live Migration with guest-memfd and mirror VM
Paolo Bonzini works on virtualization for Red Hat, where he is a Distinguished Engineer. He is currently the maintainer of the KVM hypervisor and a contributor and submaintainer for QEMU.
- The Confidential Computing Story part I: Rivers, dams and kernel development
- QEMU Keynote
System Engineer @ Nutanix
- UserfaultFD-based Memory Overcommitment
Roy Hopkins has over 15 years of software development experience in the field of
data protection. Specialising in confidential computing, he has extensive
knowledge of isolation technologies including Intel SGX and AMD SEV and related
hardware. He is currently working on enabling KVM for the COCONUT-SVSM project.
- COCONUT-SVSM on KVM: Progress, Plans, and Challenges
Software Engineer at Cyberus Technology
- Automated hypervisor testing and benchmarking on hardware
Sergio is a Senior Principal Software Engineer at Red Hat. After a tenure in the Virtualization Team, he joined the Automotive Team to help building a car-friendly Virtualization stack for CentOS AutoSD. He's also the maintainer of the microvm machine type in QEMU, main author and maintainer of libkrun (an opinionated VMM written in Rust and based on rust-vmm components) and co-maintainer of various crates from the rust-vmm project.
- Getting QEMU ready for the Automotive Industry
- The many faces of virtio-gpu
- Virtualizing Arm TrustZone on KVM
Software Engineer at IGEL Co., Ltd.
- Virtual device for testing the Linux PCIe endpoint framework
Stefan works on QEMU and Linux VIRTIO drivers in Red Hat's Virtualization team. He focuses on storage and has worked on virtiofs, virtio-vsock, and tracing in the past. A QEMU contributor since 2010, he organizes open source internships for QEMU and is part of QEMU's Technical Leadership Committee.
- IOThread Virtqueue Mapping: Improving virtio-blk SMP scalability in QEMU
Stefano is a Principal Software Engineer at Red Hat. He is the maintainer of Linux's vsock subsystem (AF_VSOCK) and co-maintainer of rust-vmm. Current projects cover Confidential VMs, virtio devices, storage for VMs.
- Coconut-SVSM: Early attestation to unlock persistent state
Hypervisor Engineer @ Nutanix
- UserfaultFD-based Memory Overcommitment
Tobin Feldman-Fitzthum is a Software Engineer at the T.J. Watson IBM Research Center. His focus is secure virtualization and confidential computing. After working on live migration, encrypted disk images, and remote attestation for confidential VMs, Tobin helped found the Confidential Containers project and establish it as a CNCF sandbox project.
- Is OVMF too Slow for Serverless Confidential Computing?
Tom Lendacky is a member of the Linux OS group at Advanced Micro Devices where he is responsible for enabling and enhancing support for AMD processor features in the Linux kernel. He is currently working on extending the SEV support in the Linux kernel to further enhance the features and capabilities of SEV-SNP (Secure Encrypted Virtualization - Secure Nested Paging). He has spoken at various Linux events, including KVM Forum a few times.
- SNP Live Migration with guest-memfd and mirror VM
- SVSM and VM Privilege Level instantiation and execution
Vitaly works at Red Hat Virtualization Engineering team focusing on KVM development as well as making Linux the best guest for other hypervisors. He frequently presents at FOSDEM, KVM Forum, DevConf and other technical conferences.
- Empowering confidential VMs in the cloud to use their own firmware upon instantiation.
Android kernel hacker at Google.
- Guest-side changes for confidential guests in Android
I am currently working at ByteDance, with a primary focus on GPU virtualization and GPU driver development
- The Challenges of building AI Infra on virtualization
Yui Washizu works for NTT (Nippon Telegraph and Telephone Corporation) Open Source Software Center,
where she has been in charge of research and development in system software for several years.
Her main focus is high-performance virtual networking of Linux and Qemu, such as hardware offload.
She also discussed this feature at Netdev 0x17, a conference for Linux network developers, with a presentation titled "Unleashing SR-IOV Offload on Virtual Machines."
- Unleashing SR-IOV on Virtual Machines
Zhao (Liu) is a virtualization engineer at Intel. He is working on leverage capabilities of Intel hybrid architecture to client Guests. His focus areas include QEMU, KVM and crosvm.
- The Road to Optimal CPU Virtualization on Hybrid Platform
- The Road to Optimal CPU Virtualization on Hybrid Platform
Zhi is an open-source developer working on vGPU, confidential computing, and virtualization. He is currently working on NVIDIA vGPU. For confidential computing, he is interested in Intel TDX/AMD SEV-SNP and worked on TDX connect enabling at Intel.
- vfio-cxl: CXL Type 2 Device Passthrough With VFIO