YoVDO

Empowering Confidential VMs to Use Custom Firmware in Cloud Environments

Offered By: KVM Forum via YouTube

Tags

Confidential Computing Courses Cloud Computing Courses Virtual Machines Courses QEMU Courses KVM Courses UEFI Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a method for supplying system firmware for virtual machines as part of the VM disk image in this 30-minute KVM Forum talk. Learn how this approach allows confidential VMs to use their own firmware upon instantiation, addressing trust issues for end users and update challenges for cloud providers. Discover the advantages of this technique over using IGVM container images, including simplified packaging, guest-controlled upgrades, and the ability to update firmware without redeploying VM images. Gain insights into the implementation using QEMU/KVM/EDK2/UKI and see a demonstration of the prototype in action. Understand how this innovation could revolutionize firmware management for confidential VMs across the cloud industry.

Syllabus

Empowering confidential VMs in the cloud to use their own firmware upon instantiation.


Taught by

KVM Forum

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube