Главная
Study mode:
on
1
Intro
2
What are your concerns
3
How to ask a question
4
Trusted kernel
5
Container security
6
Can we give Mike a mic
7
What is adequate
8
How secure is it
9
The difficulty of breaking out
10
Removing guest memory
11
Cloud security
12
Installing page tables
13
Installing modules
14
Hardware assist
15
Mike Rappoport
Description:
Explore the security properties of secret memory in this 28-minute conference talk presented by James Bottomley and Mike Rappoport from IBM at a Linux Foundation event. Delve into topics such as trusted kernels, container security, cloud security, and hardware assistance. Learn about the challenges of breaking out of secure environments, techniques for removing guest memory, and the process of installing page tables and modules. Gain insights into what constitutes adequate security measures and how to assess the level of security in various scenarios. Understand the importance of asking the right questions when it comes to system security and discover potential improvements to enhance the protection of sensitive information in memory.

Analyzing and Improving the Security Properties of Secret Memory

Linux Foundation
Add to list
0:00 / 0:00