YoVDO

Analyzing and Improving the Security Properties of Secret Memory

Offered By: Linux Foundation via YouTube

Tags

System Security Courses Cloud Security Courses Security Assessment Courses Container Security Courses Memory Protection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the security properties of secret memory in this 28-minute conference talk presented by James Bottomley and Mike Rappoport from IBM at a Linux Foundation event. Delve into topics such as trusted kernels, container security, cloud security, and hardware assistance. Learn about the challenges of breaking out of secure environments, techniques for removing guest memory, and the process of installing page tables and modules. Gain insights into what constitutes adequate security measures and how to assess the level of security in various scenarios. Understand the importance of asking the right questions when it comes to system security and discover potential improvements to enhance the protection of sensitive information in memory.

Syllabus

Intro
What are your concerns
How to ask a question
Trusted kernel
Container security
Can we give Mike a mic
What is adequate
How secure is it
The difficulty of breaking out
Removing guest memory
Cloud security
Installing page tables
Installing modules
Hardware assist
Mike Rappoport


Taught by

Linux Foundation

Tags

Related Courses

Armv8-M Architecture Fundamentals
Arm Education via Coursera
Memory Management in OS - Contiguous Memory Allocation
CodeHelp - by Babbar via YouTube
Shreds - Fine-Grained Execution Units with Private Memory
IEEE via YouTube
CHERI - A Hybrid Capability-System Architecture for Scalable Software Compartmentalization
IEEE via YouTube
XMP: Selective Memory Protection for Kernel and User Space
IEEE via YouTube