YoVDO

Hiding Attestation with Linux Keyring in Confidential Virtual Machines

Offered By: Confidential Computing Consortium via YouTube

Tags

Confidential Computing Courses Cloud Computing Courses Cryptography Courses Virtualization Courses Data Protection Courses Virtual Machines Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of hiding attestation using Linux Keyring in Confidential Virtual Machines in this 32-minute conference talk by Mikko Ylinen, a Cloud Software Architect at Intel. Gain insights into advanced security techniques for protecting sensitive data and processes in virtualized environments. Learn how the Linux Keyring can be leveraged to enhance the confidentiality and integrity of attestation mechanisms in CVMs, contributing to more robust and secure cloud computing infrastructures.

Syllabus

Hiding Attestation with Linux Keyring in Confidential Virtual Machines - Mikko Ylinen (Intel)


Taught by

Confidential Computing Consortium

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube