Open Source Firmware Conference 2019

The speaker’s profile picture
Aamir Bohra

Aamir is working as a Coreboot developer at Intel. He started as UEFI BIOS Engineer in 2014, developing UEFI BIOS for tablet and Client platforms, with key responsibility to support IBVs and OEMs BIOS enabling. In 2017, he started working as coreboot developer, responsible to develop coreboot SOC code for newer client platforms, bring up Intel reference boards and support OEM/ODM design enabling.

  • Process to update Microcode in field for Chromebook
The speaker’s profile picture
Alistair Francis

As an engineer working in Western Digital's R&D department, I am focused on QEMU and RISC-V enablement. I have previous industry experience working in embedded devices, focused on business-facing SoC designs and software stacks. As a QEMU maintainer, I am interested in improving QEMU's support for RISC-V. I have been working on RISC-V boot enablement for both QEMU and hardware, aiming to make the process simpler and more efficient.

  • The Role of Open Source Firmware in RISC-V
The speaker’s profile picture
Atish Patra

Atish is a open source software developer mainly interested in Linux kernel, virtualization, and boot loaders.

  • The Role of Open Source Firmware in RISC-V
The speaker’s profile picture
Ben Wei

Ben Wei is a software engineer working on OpenBMC at facebook.

  • NIC monitoring and management in OpenBMC
  • OOB Firmware Upgrade using PLDM over NCSI/RBT
The speaker’s profile picture
Brian Richardson

Brian Richardson works for Intel on Firmware Ecosystem Engagement, having spent most of his career as a "BIOS guy" working on the firmware that quietly boots billions of computers. He has focused on the industry transition to the Unified Extensible Firmware Interface (UEFI), demystifying how firmware works, and promoting open source firmware development. Brian has presented at numerous conferences including LinuxCon, openSUSE Summit, Open Source Firmware Conference (OSFC), and Bsides.

  • Hardening Firmware Components with Host-based Analysis Tools
The speaker’s profile picture
Christian Svensson

Christian Svensson has worked on production infrastructure for many years and have recently transitioned to work full time on hardware security projects.

  • u-bmc as greenfield BMC firmware
The speaker’s profile picture
Chris Wood

Chris is a Principal Engineer at Lenovo responsible for systems management firmware. While new to OpenBMC his enterprise experience spans 9 Intel generations of chipsets as well as AMD. He has developed BMC firmware on high volume 2 CPU servers up to multi-node 16 CPU servers.

  • Scaling OpenBMC out to high end enterprise server -- learnings
The speaker’s profile picture
Connor Reed

Connor Reed is a Firmware Development Engineer at Lenovo responsible for systems management software. New to the OpenBMC community, he works with a team of experienced BMC developers on a range of platforms from single-socket IoT/Edge servers to Mission Critical Intel 8-socket servers designed for SAP HANA workloads.

  • Scaling OpenBMC out to high end enterprise server -- learnings
The speaker’s profile picture
Deepak Kodihalli

Deepak is a Senior Engineer at IBM working on the OpenBMC project. He maintains several OpenBMC repositories, including phosphor-logging, phosphor-settingsd and PLDM. He is the IBM lead on the PLDM deliverables for OpenBMC. He is also a member of the DMTF PMCI workgroup.

  • PLDM support on OpenBMC
The speaker’s profile picture
Emily Shaffer

Emily Shaffer is a software engineer at Google working on Git; in her 20% time she comaintains OpenBMC's IPMI stack. She's passionate about software best practices, regular expressions, and her dog, Crash Override.

  • Hack the Project Onboarding Process: Learning by Writing Tutorials as a New Contributor
The speaker’s profile picture
Eugene Myers

Laboratory for Advanced Cybersecurity Research, US National Security Agency

  • Implementing STM support for Coreboot
The speaker’s profile picture
Felix Held

Felix has studied electrical engineering and currently works as a
freelancer in the area of hardware, FPGA, firmware and software
engineering. He is interested in finding out how software and hardware work and how they can be improved.

  • creating an affordable alternative to SPI flash emulators for firmware development and test
The speaker’s profile picture
Fredrik Stromberg

Fredrik Stromberg established his first connection with the Internet
in the mid-1990s and became fascinated by
networks, open-source software, and security shortly thereafter. Together with his friend Daniel Berntsson he cofounded Mullvad in 2009 - a privacy-focused VPN service that helps keep users' online activity, identity, and location private. Its goal is to make internet censorship and surveillance ineffective. Mullvad has consistently been first in, or an early adopter of, many of the technologies and security features that are today regarded as standard practice by VPN services.

  • Introducing System Transparency
The speaker’s profile picture
Gan Shun Lim

Gan Shun Lim is one of the core developers of Linuxboot and has been working on it since its inception in 2017. Gan has been wrangling with UEFI binary images ever since and started Fiano in an attempt to make UEFI binary modifications simpler and scriptable. Gan studied Computer Engineering at the University of Illinois at Urbana Champaign and joined Google in 2015. Gan has a keen interest in firmware, operating systems, and virtualization.

  • Fiano: Go Forth and Modify
The speaker’s profile picture
George Wilson

George Wilson is a security architect and security development team lead in IBM's Linux Technology Center. Since joining the LTC in 2004, he has led IBM's Linux security certifications and continued development and product exploitation of open source security technology including cryptographic coprocessor support, Trusted Computing, Mandatory Access Control, and OpenPOWER secure boot. Prior to the LTC, he was a software developer for various IBM products for 15 years. He has spoken at internal IBM conferences, LinuxCon, and the Linux Security Summit. He holds a BS CS from Louisiana State University.

  • OpenPOWER Bootloader Security
The speaker’s profile picture
Gunnar Mills

Gunnar is a Software Engineer at IBM working on the OpenBMC Project. He is a maintainer of four OpenBMC repositories including the web interface repository and is the IBM lead on the Redfish deliverable for the OpenBMC 2.7 and 2.8 releases.

  • Redfish on OpenBMC
The speaker’s profile picture
Hasjim Williams

Hasjim is a RISC-V Tech enthusiast, an individual member of the RISC-V foundation and long time open source contributor.

Hasjim works as a Firmware Engineer in his day job on Coreboot, Tianocore and Linux Device Drivers. In his spare time, he enjoys tinkering with FPGAs, RISC-V and other projects. He has worked with other open hardware contributors, both in hardware and software.

  • RISC-V - SBI on Litex FPGA SoCs and other hardcores
The speaker’s profile picture
Isaac Oram

Isaac Oram is a firmware engineer with more than 20 years of experience with Intel Architecture firmware and product development. Isaac's focus is on developing and enabling the firmware solutions that facilitate a wide range of embedded, mobile device, client, and server products based on Intel platforms.

  • Intel Open Platform Enabling Plans
The speaker’s profile picture
Jagan Teki

Jagan is CEO, Linux kernel engineer at Amarula Solutions Open Source center at India. Most of the work involves providing open source solutions to the customers and he is actively involved in open source development along with maintenance for the projects like Linux Kernel,
U-Boot, Buildroot, and Yocto.

  • 2019 State of U-Boot Development Report
The speaker’s profile picture
Jin Jhu Lim

Jin Jhu Lim is a BIOS & Bootloader Engineer from Internet Of Things Groups (IOTG) at Intel. Currently, she is working on coreboot and slim bootloader related projects.

  • A guide for porting Slim Bootloader on your Mainboard with Intel SoC
The speaker’s profile picture
Joel Stanley

As the OpenBMC kernel maintainer, in this talk I will share with the community the efforts over the past year in upstreaming BMC kernel support.

This talk will cover the development process, the status of the supported BMC system on chips, and what work remains.

It will also discuss work that is coming up over the next few months to enable new machines that various OpenBMC contributors plan to build.

  • OpenBMC kernel: Upstream efforts and latest progress
The speaker’s profile picture
Jonathan Zhang

Jonathan is passionate at architecting lower level system firmware/software to achieve computer system design goals. He used to work at software organization of hardware companies (silicon vendors), he is working at hardware organization of software company
(hyper-scaler). He is thrilled at collaborating with industry
colleagues to form visions, and make them into reality.

  • Build coreboot/linuxboot firmware for Facebook OCP platform
The speaker’s profile picture
Julius Werner

Julius Werner is a firmware developer for Google's Chrome OS and has been responsible for the firmware of most Arm-based Chromebooks. He also acts as maintainer of the arm and arm64 architectures and several related SoCs for the coreboot project.

  • The future of firmware verification in coreboot
The speaker’s profile picture
Kai

Kai is a Hacker from Bochum, Germany. He is interested in static program analysis, cryptography and Trusted Computing.

  • Introducing System Transparency
The speaker’s profile picture
Keith Campbell

Keith Campbell is an XCC engineer at Lenovo and a contributing member of the DMTF Redfish Forum. Prior to Lenovo, he worked in storage development at NetApp and systems management groups at IBM.

  • Open source tools for hardware and firmware management using Redfish API
The speaker’s profile picture
Kerry Brown

Kerry Brown is co-founder and CEO of SilverBack Ltd. SilverBack was primarily founded in 2016 to provide firmware consulting services to companies wishing to use open-source firmware solutions in x86 based devices. We also provide temporary staffing and employee placement services with an emphasis on firmware and open-source engineering.

Kerry has been working with the coreboot community since 2011 as Vice President of Sales for Sage Electronic Engineering. In that role, he helped AMD and Intel develop sales messaging and customer support materials for their customers to adopt coreboot in their designs.

Kerry currently lives on a ranch in Colorado with his wife, four dogs and five horses. He enjoys horseback riding, hiking and outdoor activities in the Colorado Rocky Mountains.

  • Adaptation of AMD Reference Firmware to coreboot© Using FSP 2.0
The speaker’s profile picture
Kun Yi

Kun has been working on enabling OpenBMC for a couple of server
projects at Google. He also enjoys tooling around with UEFI/kernel, or
debugging random failures from time to time. Before joining Google,
Kun has a background in Electrical and Computer Engineering, but
algorithms was one of his favorite classes. Outside of work Kun likes
to music, video games, and photography.

  • Platform telemetry and diagnostics
The speaker’s profile picture
Lei Yu

Lei YU is an OpenPOWER AE at IBM who supports partners on their OpenBMC development. He maintains some OpenBMC repo and actively reviews code in random repos. Before joining IBM, he worked on KreaTV at Motorola/Arris, which is a great project mainly written in clean and testable C++ code.

  • An example of OpenBMC on a new FP5280G2 system
The speaker’s profile picture
Louis Murerwa

Louis Murerwa is an intern on the LinuxBoot project team at Google. Louis has contributed immensely to the implementation of WebBoot with his podmate, Urvisha Patel. Louis is a sophomore and he is majoring in Computer Science at Dartmouth College in New Hampshire. Louis has a keen interest in operating systems and virtualization.

  • LinuxBoot Playground
The speaker’s profile picture
Maggie Jauregui

Maggie Jauregui is a firmware security researcher for Intel's Platform Armoring and Resiliency (PAR) team. PAR team contributes to and maintains the CHIPSEC tool and is part of the larger organization that delivers TianoCore within Intel.

  • Debugging Intel Firmware using DCI & USB 3.0
The speaker’s profile picture
Matteo Carlini

In a world of a trillion connected devices, Firmware security must be seen as a shared responsibility among all vendors and across different market segments, from Cloud to IoT. TrustedFirmware.org provides a collaborative platform to develop open source reference implementations of Secure world Software & Firmware on the Arm architecture, for both resource-constrained Microcontrollers and powerful Application processors. Moreover, as the architecture progresses and new security features and bespoke platform differentiator factors are deployed, there is an increasingly compelling need for simplification and consolidation of an open-source secure Firmware implementation. Trusted Firmware aims to fulfill that need, by constituting the standard secure basis of all connected devices, encouraging vendors to move their platform specific services into secure sandboxes, and by providing the foundation of the Arm Platform Security Architecture (PSA) Framework.

  • TrustedFirmware.org - A collaborative effort into Firmware security and the path towards standardized open source Firmware on Arm
The speaker’s profile picture
Michael Kubacki

Michael Kubacki is a firmware engineer at Intel currently focused on UEFI and work related to TianoCore. Michael started in mobile SoC firmware and he has since worked in firmware development across several generations of Intel client, mobile, and server products. Over the past few years, he has been responsible for introducing Intel boot code to boot from block media devices such as eMMC, NVMe, and UFS. He is an advocate for open source product code and works toward this goal at Intel through initiatives such as EDK II Minimum Platform.

  • Minimum Platform: Open Source UEFI Firmware for Intel Based Platforms
The speaker’s profile picture
Michał Żygowski

Michał Żygowski is Firmware Team Leader at 3mdeb - Embedded Systems Consulting. He is a lead developer in the company firmware projects. Always enthusiastic about advanced hardware features and network
solutions in embedded systems. Familiar with UEFI/EDK2/BIOS and numerous other technologies, but his real specialty is coreboot, which he is contributing to in the meantime. Keen on security issues and a huge fan
of open-source.

  • Start trusting Your BIOS - SRTM with vboot, TPM and permanent flash protection
The speaker’s profile picture
Mickey Shkatov

Mickey Shkatov, a principal researcher at Eclypsium, has been performing security research and product security validation since 2010, He spends most of his time probing and hacking hardware, firmware and sometimes software.

  • Debugging Intel Firmware using DCI & USB 3.0
The speaker’s profile picture
Morgan Jang

I am senior BIOS engineer at Wiwynn. I worked on notebook BIOS for 4 years before developing server BIOS at Wiwynn and familiar with Intel platforms.

  • Build coreboot/linuxboot firmware for Facebook OCP platform
The speaker’s profile picture
Neeraj Ladkani

Microsoft

  • Platform telemetry and diagnostics
The speaker’s profile picture
Ofir Weisse

Ofir is a Ph.D. candidate at the University of Michigan. His research focuses on improving the feasibility of trustworthy execution in the cloud. His recent publications include Foreshadow (aka L1TF), redesigning modern processors to be resilient to Spectre (NDA), and alleviating SGX performance bottlenecks (HotCalls). Ofir worked for Intel in Haifa as a security researcher in the SGX group. He received his Master's in Computer Engineering from Tel-Aviv University and B.Sc from the Technion in Israel. His previous research focused on manipulating MEMS sensors and differential power analysis of cryptographic devices, which was published in Euro S&P, CHES, and HASP.

  • Booting Windows on LinuxBoot
The speaker’s profile picture
Patrick Rudolph

coreboot developer since 2015.

  • State of coreboot on Lenovo Thinkpads
The speaker’s profile picture
Piotr Król

Piotr Król is Founder and Embedded Systems Consultant at 3mdeb - the licensed provider of coreboot consulting services. He attained M. Sc. degree in Computer Systems Networking and Telecommunication after graduating from the Gdańsk University of Technology. After working as Storage Controllers Validation Engineer and BIOS Software Engineer in Intel Technology Poland for over 7 years, he created his own consulting business focused on Embedded Firmware (coreboot, UEFI/EDK2/BIOS) and Embedded Linux (Yocto, Linux Device Drivers, Qt/C++/Go/Python applications). He combines his work and passion building firmware that
enables advanced hardware features and follows best security practices. His team maintains PC Engines platforms in coreboot and actively work on and contribute to Open Source Firmware. Feel free to contact Piotr if you have any questions about the related topic.

  • TrenchBoot - Open DRTM implementation for AMD platforms
  • Consideration about enabling hypervisor in open source firmware
The speaker’s profile picture
Pratik Prajapati

Pratik is software engineer in Intel. Currently he is working on Coreboot development for various Intel SOCs. In his free time, he enjoys playing with his kids.

  • Multiprocessor Initialization in Coreboot
The speaker’s profile picture
Ratan Gupta

Ratan is an Advisory Engineer at IBM working on the OpenBMC project. He maintains several OpenBMC repositories, including phosphor-networkd, phosphor-user-manager and Phosphor-snmp.He is also a member of the DMTF Redfish workgroup.

  • Eventing through Redfish
The speaker’s profile picture
Ravi Rangarajan

The Slim Bootloader was launched publicly in OSFC2018. Since then, it has attracted public interest and gaining momentum in adoption from the open-source community. The team at Intel continues to make improvements, enhancements & new features to Slim Bootloader over the year and this presentation will provide a summary of what has changed and the key learnings we’ve obtained. This session will also share on the future plans for Slim Bootloader and what’s to be expected.

  • Slim Bootloader Turns One - Updates, Key Learning & What's Next
The speaker’s profile picture
Richard Hughes

Richard has over 15 years of experience developing open source software and currently maintains the LVFS, fwupd and lots of other GNOME apps and infrastructure. Richard graduated from the University
of Surrey with a Masters in Electronics Engineering and now works as a principle engineer in the desktop group at Red Hat. Recently he has been reviewing, writing and dissembling all kinds of firmware. Richard likes eating good food and is a dad to two daughters.

  • Introducing the Linux Vendor Firmware Service
The speaker’s profile picture
Rick Altherr

Rick Altherr has a career ranging from ASICs to UX with a focus on the intersection of hardware and software. During his 9 years in Google's server development group, he was responsible for key components of the infrastructure that monitored machine health across Google's datacenters, led the unification of OpenBMC as a project under Linux Foundation, and publicly explained how Titan is used to provide a root of trust for measurement. As Principal Engineer at Eclypsium, Rick is both a security researcher focused on vulnerability detection and mitigation in firmware as well as a software engineer integrating the findings of that research into Eclypsium's products. In his free time, he reverses engineers FPGA bitstream formats and ECU (engine control unit) programming protocols, tunes drag race car engines and he restores classic cars.

  • Common BMC vulnerabilities and how to avoid repeating them
The speaker’s profile picture
ronald g. minnich

Ron is the inventor of LinuxBIOS, now known as coreboot; u-root, the Go userland now widely used in linuxboot deployments; linuxboot itself; and oreboot, which is coreboot with out 'C' -- it is written in Rust. He is the co-leader of the Open Systems Firmware effort at Open Compute Platform Foundation; and a founder and member of the Technical Steering Committee of linuxboot at the Linux Foundation.

  • Oreboot
  • Coreboot 20th Anniversary
  • How to get super small linuxboot images and still have everything you need with the 'cpu' command
  • Coreboot Lite/Rampayload and Linuxboot
The speaker’s profile picture
Ryan O'Leary

Ryan O’Leary is a core developer of LinuxBoot within Google. Ryan contributes significantly to u-root, fiano, oreboot, and was a key researcher of the LinuxBoot project in its early stages at Google. Ryan studied software engineering at the University of Waterloo in Canada. He has a keen interest in firmware, hardware, and embedded systems.

  • Oreboot
  • Fiano: Go Forth and Modify
The speaker’s profile picture
Sami Mujawar

Sami Mujawar is a Principal Engineer at Arm Limited. He has 18 years of experience in developing system software including 6 years with UEFI firmware development, ACPI, and platform validation for Windows on Arm. Sami is currently focused on automating generation of firmware tables using machine readable hardware description.

  • An update on Dynamic Tables (a framework to automate generation of ACPI & SMBIOS tables).
The speaker’s profile picture
SarathyJayakumar
  • Passing System Configuration Data from Firmware to Kernel
The speaker’s profile picture
Satish Kumar

Myself Satish kumar G having 13 years exp. in Embedded systems both in Firmware & Linux kernel exp. with different ARM controllers & ARM Processor. Having work exp. in TI OMAP, XiIinx Zynq Z7000, Cavium OcteonTx, LPC, ST Micro, TI Tiva series Micro controllers with Bare metal, RIOT, FreeRTOS, Linux kernel & worked on Xilinx FPGA boards.

  • Understanding uboot code with Bare metal drivers using Xilinx FPGA board
The speaker’s profile picture
Scott Burns

Scott Burns is the Senior Director of Research and Development at Packet, a bare-metal cloud provider. He is currently focused on projects in the areas of firmware, security, and FPGAs. Prior to the formation of Packet Labs, he acted as Packet's Arm Systems Architect, launching multiple 64-bit Arm server options for users. He has spent nearly 20 years in the web hosting industry and enjoys working with Internet infrastructure.

  • Open Source Firmware in the Bare-Metal Cloud
The speaker’s profile picture
Simon Glass

Simon Glass has worked in embedded systems for many years, at ARM, Bluewater Systems (which he founded) and Google. In his spare time, Simon is a contributor to U-Boot and is custodian of its driver model. He works on new Chromebook developments in Boulder, Colorado.

  • binman: A data-controlled firmware packer for U-Boot
The speaker’s profile picture
Sivagar Natarajan
  • Passing System Configuration Data from Firmware to Kernel
The speaker’s profile picture
Supreeth Venkatesh

Supreeth Venkatesh is a Staff Software Architect at Architecture and Technology group, Arm.
He is part of OpenBMC Technical Steering Committee. He is an active member of DMTF PMCI WG and represents Arm in that Forum.
Also, he is an active member in UEFI Test Working Group(UTWG), maintainer of UEFI Self Certification tests and acts as the liaison from Arm.

  • Server Base Manageability Guide for SBSA compliant Arm (aarch64) servers.
The speaker’s profile picture
Tan Lean Sheng

Sheng is a BIOS engineer working on Coreboot and Slim Bootloader projects after joining Intel in 2017. Sheng has a keen interest in firmware development. Outside of work Sheng is a tech geek and enjoys playing Frisbee.

  • Coreboot Lite/Rampayload and Linuxboot
The speaker’s profile picture
Tom Joseph

Tom is an Advisory Software Engineer at IBM working on the OpenBMC project. He maintains several OpenBMC repositories, including phosphor-net-ipmid, phosphor-host-ipmid and pldm. He is also a member of the DMTF PMCI workgroup.

  • Tooling infrastructure for Platform Management Subsystem protocols
The speaker’s profile picture
Urvisha Patel

Urvisha Patel is an intern on the LinuxBoot project within Google. Urvisha significantly contributed to the implementation of webboot with her podmate, Louis Murerwa. As a third-year student, Urvisha currently studies at DePaul University in Chicago, IL, majoring in Computer Science: Software Development and minoring in Business Administration. She has a keen interest in firmware and systems engineering.

  • LinuxBoot Playground
The speaker’s profile picture
Vernon Mauery

Vernon has been working in the open source world through college and most of his career. His interests lie in embedded firmware and has found BMC firmware development, especially work on OpenBMC, to be a fulfilling job. One of his roles at work is a Product Security Expert, in which he has the opportunity to find ways to make Intel's BMCs more secure. In his spare time, Vernon has a passion for making excellent bread and pizza.

  • Improving Security and Readability at the Same Time
The speaker’s profile picture
William Kennington

William is a software engineer at Google, working on bringing up new server platforms and out of band management systems. Outside of work he has spent some of his free time maintaining a hobby Linux distribution focused on hermetic builds and reproducibility. He maintains some of the OpenBMC software components, and would like to see an increased focus on quality and reliability.

  • OpenBMC System Resilience
The speaker’s profile picture
Xulei Ren

Senior development manager at Lenovo Data Center Group Server Development. Over 15 years of experience in server management, focusing on Redfish, power management, FW/driver update, OS deployment. Leading the development of Redfish scripts, energy management software, driver/FW bundles for Lenovo new server products.

  • Open source tools for hardware and firmware management using Redfish API
The speaker’s profile picture
Yah-Wen Ho

Yah Wen is a Senior BIOS & Bootloader Lead Engineer from the Internet of Things Group (IoTG) in Intel Corporation. He has 15 years' experience in BIOS, UEFI & bootloader development mainly in computer mobile & desktop boards, industrial PXIe controllers as well as other embedded systems. He is from Penang, Malaysia.

  • Slim Bootloader Turns One - Updates, Key Learning & What's Next
  • A guide for porting Slim Bootloader on your Mainboard with Intel SoC
The speaker’s profile picture
Yanwen Cai

Senior engineer at Lenovo Data Center Group Server Development. More than 10 years of experience in BMC firmware domain. working on server hardware management, firmware RAS, web GUI, Redfish, PLDM deliverables. Leading the BMC (XCC) core development for Lenovo ThinkSystem new server products.

  • Snapper: Open source firmware implementation for Redfish