YoVDO

Pandora: Symbolic Validation of SGX

Offered By: Confidential Computing Consortium via YouTube

Tags

Intel SGX Courses Hardware Security Courses Side Channel Attacks Courses Formal Verification Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the symbolic validation of Intel SGX in this 45-minute conference talk by Jo Van Bulck, presented by the Confidential Computing Consortium. Dive into the intricacies of Pandora, a tool designed to enhance the security and reliability of Intel's Software Guard Extensions (SGX) technology. Learn about the methodology, challenges, and implications of using symbolic validation techniques to verify SGX implementations. Gain insights into how Pandora contributes to identifying potential vulnerabilities and strengthening the overall security posture of SGX-based systems. Understand the importance of rigorous validation processes in confidential computing and their impact on protecting sensitive data in secure enclaves.

Syllabus

Pandora Symbolic validation of SGX - Jo Van Bulck


Taught by

Confidential Computing Consortium

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube