YoVDO

Chains of Trust in Confidential Computing

Offered By: DevConf via YouTube

Tags

Confidential Computing Courses Remote Attestation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of Confidential Computing in this 35-minute conference talk from DevConf.CZ 2023. Delve into the various chains of trust required to preserve confidentiality in Confidential Virtual Machines, Containers, and Clusters. Learn about the roots of trust, proof mechanisms, verification processes, and the implications of successful verification in each scenario. Discover key techniques and technologies, including local and remote attestation, firmware-based certification, virtual TPM implementations, and attested TLS. Gain insights into the different requirements for attesting execution environments, workloads, users, and nodes joining clusters. Access accompanying slides for a comprehensive understanding of this cutting-edge technology that protects data in use through memory encryption and other advanced methods.

Syllabus

Chains of trust in Confidential Computing - DevConf.CZ 2023


Taught by

DevConf

Related Courses

Google Cloud Confidential Computing: Qwik Start
Google via Google Cloud Skills Boost
A WASM Runtime for FaaS Protected by TEE
Linux Foundation via YouTube
Accounting and Page Migration Challenges in Secure Guests Using FD-Based Private Memory
KVM Forum via YouTube
Allowing an Intel TDX Module to Run Without SEAM - Development Techniques
Linux Foundation via YouTube
AMD SEV-SNP Attestation - Establishing Trust in Guests
Linux Foundation via YouTube