YoVDO

Pandora: Symbolic Validation of SGX

Offered By: Confidential Computing Consortium via YouTube

Tags

Intel SGX Courses Hardware Security Courses Side Channel Attacks Courses Formal Verification Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the symbolic validation of Intel SGX in this 45-minute conference talk by Jo Van Bulck, presented by the Confidential Computing Consortium. Dive into the intricacies of Pandora, a tool designed to enhance the security and reliability of Intel's Software Guard Extensions (SGX) technology. Learn about the methodology, challenges, and implications of using symbolic validation techniques to verify SGX implementations. Gain insights into how Pandora contributes to identifying potential vulnerabilities and strengthening the overall security posture of SGX-based systems. Understand the importance of rigorous validation processes in confidential computing and their impact on protecting sensitive data in secure enclaves.

Syllabus

Pandora Symbolic validation of SGX - Jo Van Bulck


Taught by

Confidential Computing Consortium

Related Courses

Hardware Security
University of Maryland, College Park via Coursera
Information Security- II
Indian Institute of Technology Madras via Swayam
Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Cybersecurity
University of Maryland, College Park via Coursera
Learning Mobile Device Security
LinkedIn Learning