YoVDO

Hiding Attestation with Linux Keyring in Confidential Virtual Machines

Offered By: Linux Foundation via YouTube

Tags

Confidential Computing Courses Encryption Courses Virtual Machines Courses Data Privacy Courses Trusted Execution Environment Courses Remote Attestation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of hiding attestation with Linux Keyring in Confidential Virtual Machines in this 36-minute conference talk by Mikko Ylinen from Intel. Delve into the fundamentals of confidential computing (CC) and its crucial feature of remote attestation for trusted execution environments (TEEs). Learn how Linux Keyring can be leveraged to seamlessly integrate attestation into existing workloads without disrupting them. Discover the potential of this approach through practical examples, including filesystem encryption key provisioning and attestation token provisioning. Gain insights into streamlining the adoption of confidential computing and enhancing security measures for application data processing in TEEs.

Syllabus

Hiding Attestation with Linux Keyring in Confidential Virtual Machines - Mikko Ylinen, Intel


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube