Device Attestation in Hardware TEE-Based Confidential Computing
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore device attestation in hardware TEE-based confidential computing through this 30-minute conference talk by Intel experts. Learn about protecting data in use within Trusted Execution Environments (TEEs) and the process of securely transferring workloads from TEE virtual machines to accelerator devices. Discover the device attestation model, its application in TEE VMs, and the methods for collecting and verifying device identity and evidence information. Gain insights into maintaining workload confidentiality and ensuring authentic device communication with expected security status before offloading tasks.
Syllabus
Device Attestation in Hardware TEE based Confidential Computing - Jiewen Yao & Jun Nakajima, Intel
Taught by
Linux Foundation
Tags
Related Courses
IoT Product SecurityCybrary Trusted Execution Environments Meet the Blockchain
Simons Institute via YouTube Cache Side Channel Attack - Exploitability and Countermeasures
Black Hat via YouTube Confidential Computing in Cloud and Edge
RSA Conference via YouTube The Rise of Confidential Computing
RSA Conference via YouTube