Allowing an Intel TDX Module to Run Without SEAM - Development Techniques
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore Intel Trust Domain Extensions (TDX) and learn how to run or emulate a modified TDX module without SEAM in this informative conference talk. Dive into the intricacies of TDX, which isolates virtual machines from inspection or modification by the VMM and other software to protect privacy, confidentiality, and integrity. Understand the role of the signed TDX module firmware and its APIs in managing protected guest states. Examine the dilemma between security and convenience in TDX module implementation, and discover potential solutions for mitigating this issue. Learn about the environment in which the TDX module operates and compare various methods for running modified versions. Gain insights into techniques that enable TDX development without the stringent requirements of production systems, allowing for greater flexibility in Intel TDX experimentation and research.
Syllabus
Allowing an Intel TDX Module to Run Without SEAM - Isaku Yamahata, Intel
Taught by
Linux Foundation
Tags
Related Courses
Confidential Computing in Cloud and EdgeRSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube