YoVDO

Establishing Trust in Linux Keyrings - Built-in, Imputed, or Transitive Trust

Offered By: Linux Foundation via YouTube

Tags

Linux Courses Cryptography Courses Key Management Courses Threat Modeling Courses Firmware Security Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of trust establishment in Linux keyrings through this 32-minute conference talk presented by Elaine Palmer from IBM Research and George Wilson from IBM Linux Technology Center. Delve into the complexities of key usage across firmware, Linux kernel, and user space, examining their roles in signing, verifying, and encrypting other keys, code, and data. Investigate the challenges of dynamically establishing trust when authorities and relationships are unknown at build time. Learn about imputed trust derived from firmware and transitive trust based on certificate chains. Examine how keyrings in Linux define trust domains, scope, and key usage constraints, supporting various threat models. Review existing kernel keyrings, their applications, restrictions, and methods for evaluating trust in different scenarios.

Syllabus

Establishing Trust in Linux Keyrings - Is Trust Built-in, Imputed, or Transitive?


Taught by

Linux Foundation

Tags

Related Courses

Introduction to Linux
Linux Foundation via edX
操作系统原理(Operating Systems)
Peking University via Coursera
Internet of Things: Setting Up Your DragonBoard™ Development Platform
University of California, San Diego via Coursera
Information Security-3
Indian Institute of Technology Madras via Swayam
Introduction to Embedded Systems Software and Development Environments
University of Colorado Boulder via Coursera