YoVDO

Pandora: Symbolic Validation of SGX

Offered By: Confidential Computing Consortium via YouTube

Tags

Intel SGX Courses Hardware Security Courses Side Channel Attacks Courses Formal Verification Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the symbolic validation of Intel SGX in this 45-minute conference talk by Jo Van Bulck, presented by the Confidential Computing Consortium. Dive into the intricacies of Pandora, a tool designed to enhance the security and reliability of Intel's Software Guard Extensions (SGX) technology. Learn about the methodology, challenges, and implications of using symbolic validation techniques to verify SGX implementations. Gain insights into how Pandora contributes to identifying potential vulnerabilities and strengthening the overall security posture of SGX-based systems. Understand the importance of rigorous validation processes in confidential computing and their impact on protecting sensitive data in secure enclaves.

Syllabus

Pandora Symbolic validation of SGX - Jo Van Bulck


Taught by

Confidential Computing Consortium

Related Courses

SPARK 2014
AdaCore via Independent
Automated Reasoning: Symbolic Model Checking
EIT Digital via Coursera
Software Testing and Verification
University System of Maryland via edX
Haskell for Imperative Programmers
YouTube
Model Checking and Temporal Logic - E. Allen Emerson's Turing Award Lecture
Association for Computing Machinery (ACM) via YouTube