Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Offered By: Linux Foundation via YouTube
Course Description
Overview
Syllabus
Intro
CLOUD THREAT VECTORS
HARDWARE-BASED CLOUD WORKLOAD ISOLATION EVOLUTION
INTEL TDX-HIGH LEVEL SECURITY GOAL OF ARCHITECTURE
CPU ISA
VMX AND SEAM
THREAT MODEL
TD MEMORY CONFIDENTIALITY
TD MEMORY INTEGRITY
PRIVATE KEY MANAGEMENT
HW ADDRESS TRANSLATION
PHYSICAL MEMORY MANAGEMENT
ATTESTATION LEVERAGES INTEL SGX
THREAT COVERAGE - SOFTWARE ADVERSARY ATTACKS
THREAT COVERAGE - HARDWARE ADVERSARY ATTACKS
THREAT COVERAGE-TOX MODULE AND ATTESTATION ATTACKS
THREAT COVERAGE - SIDECHANNEL ATTACKS
INTEL TDX -PUTTING IT ALL TOGETHER
INTEL TDX SOFTWARE IMPLICATIONS
INTEL TDX-SW DEPLOYMENT MODELS
KVM TOUCHPOINTS
MORE ON MMU
LINUX TD GUEST TOUCHPOINTS
GHCI (GUEST-HYPERVISOR COMMUNICATION INTERFACE)
INTEL TDX PLATFORM AND SW LIFECYCLE
SUMMARY
Taught by
Linux Foundation
Tags
Related Courses
Software as a ServiceUniversity of California, Berkeley via Coursera Software Defined Networking
Georgia Institute of Technology via Coursera Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera Web-Technologien
openHPI Données et services numériques, dans le nuage et ailleurs
Certificat informatique et internet via France Université Numerique