Wednesday 

Room 3 

13:40 - 14:40 

(UTC+01

Talk (60 min)

How to Know Your Client Is Real: Hardware-Backed Authentication Patterns

Most security architectures focus on proving the server’s identity to the client, but not the other way around. This gap creates opportunities for attackers to impersonate legitimate clients through stolen credentials, compromised devices, or sophisticated spoofing techniques. Traditional methods like API keys or static certificates are no longer enough.

Application Security
Architecture
Cloud
DevOps
Platforms
Tooling

This session explores modern, hardware-backed patterns for client authentication that go beyond simple secrets. We will examine how TPMs, Apple’s Secure Enclave, hardware attestation, automated certificate delivery, HTTP message signatures, and mTLS can work together to provide verifiable client identity with strong cryptographic guarantees.

Through real-world examples, we will break down how these technologies fit together, where they differ, and how to layer them to build resilient, zero trust authentication architectures. Attendees will learn practical integration strategies spanning hardware attestation, certificate management, and transport-level verification, and how to apply these patterns to stop client impersonation in production environments.

Victor Lyuboslavsky

Victor Lyuboslavsky is a software engineering leader and author with over 25 years of experience building products and leading teams. He has co-founded startups, held technical leadership roles at AMD, and now architects secure, scalable systems for enterprise IT at Fleet Device Management.


His work bridges hands-on technical execution with strategic leadership. Drawing on experience in startups and open source communities, Victor focuses on clarity, transparency, and evolutionary design. These principles help teams scale architectures, adopt AI responsibly, and build resilient systems without creating chaos.