YoVDO

Introducing IO Devices into Trusted Execution Environments

Offered By: Linux Foundation via YouTube

Tags

Trusted Execution Environment Courses Virtualization Courses Encryption Courses Data Security Courses Intel SGX Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the challenges and solutions for integrating IO devices into Trusted Execution Environments (TEEs) in this informative conference talk by Jun Nakajima from Intel Corporation. Delve into the world of confidential computing and learn how it protects data in use through hardware-based TEEs like Intel SGX and the upcoming Trust Domain Extensions (Intel TDX). Understand the current limitations of PCIe-attached devices outside the TEE's trust boundary and their impact on data transfer and processing. Discover the security implications and performance drawbacks of the current method involving shared memory buffers and software-based encryption/decryption. Gain insights into the necessary security and software changes required to support IO in trusted execution environments, including the software requirements for TEE VMs to securely use devices in the Trusted Computing Base with DMA operations against confidential memory using encryption/decryption.

Syllabus

Introducing IO Devices into Trusted Execution Environments - Jun Nakajima, Intel Corporation


Taught by

Linux Foundation

Tags

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube