YoVDO

Trusted Execution Environments - A Technical Overview of Intel SGX, Arm TrustZone, and RISC-V PMP

Offered By: Linux Foundation via YouTube

Tags

Conference Talks Courses Cybersecurity Courses Data Integrity Courses Hardware Security Courses System Architecture Courses Trusted Execution Environment Courses Intel SGX Courses ARM TrustZone Courses

Course Description

Overview

Explore a comprehensive technical overview of Trusted Execution Environments (TEEs) in this 30-minute video presentation by Stephano Cetola from The Linux Foundation. Delve into the intricacies of Intel SGX, Arm TrustZone, and RISC-V PMP, examining their architectures, security features, and implementation processes. Learn about data integrity, attestation, privilege levels, and secure enclaves. Gain insights into hardware components, boot processes, and reference implementations for each technology. Understand the setup procedures, memory management, and specific hardware commands associated with these TEEs. Analyze RISC-V's Physical Memory Protection (PMP) mechanism, including its configurations, core architecture, and access control features. Enhance your knowledge of cutting-edge security technologies crucial for protecting sensitive data in modern computing environments.

Syllabus

Introduction
Legal Disclaimer
About me
Trusted execution environment definition
History of trust execution environments
What is not a tee
Data Integrity
attestation
rings of privilege
ARM privilege levels
The path of learning
Disclaimer
Have You Used Arm TrustZone
How Does Arm TrustZone Keep Data Secure
Arm TrustZone Hardware Components
Arm TrustZone Boot Process
Reference Implementations
Part 2 Intel SGX
Have I used Intel SGX
Secure Enclaves
Initial Enclave Setup
DRAM
Hardware Commands
EInit and ERemove
Page Management
Eget and Ereport
RISCV PMP
Risk 5 Privilege Levels
What is PMP
Setting up PMP
PMP Configurations
RISCV Cores
Control Status Registers
Registers
Access Fault
Conclusion


Taught by

Linux Foundation

Tags

Related Courses

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software
Paul G. Allen School via YouTube
fTPM - A Software-Only Implementation of a TPM Chip
USENIX via YouTube
Forging the USB Armory
44CON Information Security Conference via YouTube
RT-TEE - Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE via YouTube
Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box
Black Hat via YouTube