YoVDO

Device Attestation in Hardware TEE-Based Confidential Computing

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Hardware Security Courses Virtual Machines Courses Data Privacy Courses Trusted Execution Environment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore device attestation in hardware TEE-based confidential computing through this 30-minute conference talk by Intel experts. Learn about protecting data in use within Trusted Execution Environments (TEEs) and the process of securely transferring workloads from TEE virtual machines to accelerator devices. Discover the device attestation model, its application in TEE VMs, and the methods for collecting and verifying device identity and evidence information. Gain insights into maintaining workload confidentiality and ensuring authentic device communication with expected security status before offloading tasks.

Syllabus

Device Attestation in Hardware TEE based Confidential Computing - Jiewen Yao & Jun Nakajima, Intel


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube