YoVDO

Secure Bootloader for Confidential Computing

Offered By: Linux Plumbers Conference via YouTube

Tags

Linux Plumbers Conference Courses Confidential Computing Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the concept of secure bootloaders for Confidential Computing in this informative conference talk presented by Ken Lu and Jiewen Yao at the Linux Plumbers Conference. Delve into the critical role of secure bootloaders in ensuring the integrity and confidentiality of systems utilizing Confidential Computing technologies. Learn about the challenges and solutions in implementing secure boot processes for these specialized environments, and gain insights into the latest developments in this crucial area of cybersecurity. This 28-minute presentation offers valuable knowledge for developers, security professionals, and anyone interested in the intersection of secure boot mechanisms and Confidential Computing.

Syllabus

Secure bootloader for Confidential Computing - Ken Lu, Jiewen Yao


Taught by

Linux Plumbers Conference

Related Courses

Confidential Computing in Cloud and Edge
RSA Conference via YouTube
The Rise of Confidential Computing
RSA Conference via YouTube
Enabling Rack-Scale Confidential Computing Using Heterogeneous Trusted Execution Environment
IEEE via YouTube
Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds
Linux Foundation via YouTube
The Open Enclave SDK - Confidential Computing with Trusted Apps
Linux Foundation via YouTube