YoVDO

Software Supply Chain Security with Trusted Execution Environment Provisioning Protocol

Offered By: Linux Foundation via YouTube

Tags

Software Supply Chain Security Courses ARM Architecture Courses IoT security Courses Remote Attestation Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the benefits of the Trusted Execution Environment Provisioning (TEEP) protocol for Software Supply Chain Security in this informative conference talk. Delve into the challenges of maintaining security in an era of rapidly increasing software packages and learn how TEEP addresses these issues. Discover the standardization efforts and open-source reference implementation of TEEP at the Internet Engineering Task Force (IETF). Understand how TEEP enables lifecycle management of software packages as Trusted Components (TC), covering various devices from IoT and edge to drones and heavy industry equipment. Examine the application of TEEP on ARM, RISC-V, and Intel architectures, and learn how it verifies device integrity before installing or updating TCs using PKI key management technology. Gain insights into essential security technologies employed by TEEP, including Remote Attestation and Concise Binary Object Representation (CBOR), along with the necessary hardware requirements for implementation.

Syllabus

Software Supply Chain Security with Trusted Execution Environment Provisioning (T... Akira Tsukamoto


Taught by

Linux Foundation

Tags

Related Courses

Exploring Modern and Secure Operations of Kubernetes Clusters on the Edge
Open Data Science via YouTube
Using the Observer Effect and Cyber Feng Shui - Jacob Torrey
Hack In The Box Security Conference via YouTube
OAT - Attesting Operation Integrity of Embedded Devices
IEEE via YouTube
The Remote Working Security Conundrum - What Is Reasonably Secure Anyway?
USENIX via YouTube
Riverbed - Enforcing User-defined Privacy Constraints in Distributed Web Services
USENIX via YouTube