Introducing IO Devices into Trusted Execution Environments
Offered By: Linux Foundation via YouTube
Course Description
Overview
Explore the challenges and solutions for integrating IO devices into Trusted Execution Environments (TEEs) in this informative conference talk by Jun Nakajima from Intel Corporation. Delve into the world of confidential computing and learn how it protects data in use through hardware-based TEEs like Intel SGX and the upcoming Trust Domain Extensions (Intel TDX). Understand the current limitations of PCIe-attached devices outside the TEE's trust boundary and their impact on data transfer and processing. Discover the security implications and performance drawbacks of the current method involving shared memory buffers and software-based encryption/decryption. Gain insights into the necessary security and software changes required to support IO in trusted execution environments, including the software requirements for TEE VMs to securely use devices in the Trusted Computing Base with DMA operations against confidential memory using encryption/decryption.
Syllabus
Introducing IO Devices into Trusted Execution Environments - Jun Nakajima, Intel Corporation
Taught by
Linux Foundation
Tags
Related Courses
Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from SoftwarePaul G. Allen School via YouTube Plundervolt - Flipping Bits from Software without Rowhammer
Black Hat via YouTube When Good Turns Evil - Using Intel SGX to Stealthily Steal Bitcoins
Black Hat via YouTube CLKscrew - Exposing the Perils of Security-Oblivious Energy Management
Black Hat via YouTube Port Contention for Fun and Profit
IEEE via YouTube