Secure graphics stacks with minimal attack surface
Owner: DemiMarie
Time: Fri 6:00 PM 28 May +0200 (Europe/Berlin) Final
Location: Shanghai

Qubes OS currently requires all rendering (except compositing) to happen in software. This is enough for many applications, but not for games or 3D modeling. Existing graphics virtualization technologies require costly enterprise GPUs, fail to meet the security needs of Qubes OS, or both. This session is to discuss a different option: Create a small user-space graphics driver with minimal attack surface, and have applications communicate with it using a well-defined protocol.