YoVDO

Design and Verification of the Arm Confidential Compute Architecture

Offered By: USENIX via YouTube

Tags

OSDI (Operating Systems Design and Implementation) Courses Confidential Computing Courses

Course Description

Overview

Explore the design and verification of the Arm Confidential Compute Architecture in this 19-minute conference talk from OSDI '22. Delve into the innovative Realms abstraction, a new approach to confidential computing that protects data confidentiality and integrity of virtual machines. Learn how hardware creates and enforces the Realm world, a separate physical address space for Realms, while firmware secures them and manages requests from untrusted system software. Discover novel verification techniques used to prove the security and correctness of concurrent software with complex features such as hand-over-hand locking, dynamically allocated shared page tables, and data races in kernel code running on relaxed memory hardware. Gain insights into the integration of C and Arm assembly code, and how untrusted software maintains control of system resource allocation while being prevented from accessing Realm memory contents. Understand the significance of this technology as part of the Arm Confidential Compute Architecture and its potential impact on data privacy in computing.

Syllabus

OSDI '22 - Design and Verification of the Arm Confidential Compute Architecture


Taught by

USENIX

Related Courses

GraphX - Graph Processing in a Distributed Dataflow Framework
USENIX via YouTube
Theseus - An Experiment in Operating System Structure and State Management
USENIX via YouTube
RedLeaf - Isolation and Communication in a Safe Operating System
USENIX via YouTube
Microsecond Consensus for Microsecond Applications
USENIX via YouTube
KungFu - Making Training in Distributed Machine Learning Adaptive
USENIX via YouTube