Главная
Study mode:
on
1
Intro
2
CLOUD THREAT VECTORS
3
HARDWARE-BASED CLOUD WORKLOAD ISOLATION EVOLUTION
4
INTEL TDX-HIGH LEVEL SECURITY GOAL OF ARCHITECTURE
5
CPU ISA
6
VMX AND SEAM
7
THREAT MODEL
8
TD MEMORY CONFIDENTIALITY
9
TD MEMORY INTEGRITY
10
PRIVATE KEY MANAGEMENT
11
HW ADDRESS TRANSLATION
12
PHYSICAL MEMORY MANAGEMENT
13
ATTESTATION LEVERAGES INTEL SGX
14
THREAT COVERAGE - SOFTWARE ADVERSARY ATTACKS
15
THREAT COVERAGE - HARDWARE ADVERSARY ATTACKS
16
THREAT COVERAGE-TOX MODULE AND ATTESTATION ATTACKS
17
THREAT COVERAGE - SIDECHANNEL ATTACKS
18
INTEL TDX -PUTTING IT ALL TOGETHER
19
INTEL TDX SOFTWARE IMPLICATIONS
20
INTEL TDX-SW DEPLOYMENT MODELS
21
KVM TOUCHPOINTS
22
MORE ON MMU
23
LINUX TD GUEST TOUCHPOINTS
24
GHCI (GUEST-HYPERVISOR COMMUNICATION INTERFACE)
25
INTEL TDX PLATFORM AND SW LIFECYCLE
26
SUMMARY
Description:
Explore architectural extensions for hardware virtual machine isolation in this conference talk focused on advancing confidential computing in public clouds. Delve into cloud threat vectors, the evolution of hardware-based cloud workload isolation, and Intel's Trust Domain Extensions (TDX) architecture. Learn about security goals, CPU ISA, VMX, and SEAM technologies. Examine threat models, memory confidentiality and integrity, private key management, hardware address translation, and physical memory management. Discover how attestation leverages Intel SGX and understand threat coverage for various attack types, including software, hardware, and side-channel attacks. Gain insights into TDX software implications, deployment models, and KVM touchpoints. Investigate Linux TD guest touchpoints, Guest-Hypervisor Communication Interface (GHCI), and TDX platform and software lifecycles. Enhance your understanding of cutting-edge confidential computing technologies and their implementation in public cloud environments. Read more

Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds

Linux Foundation
Add to list
0:00 / 0:00