Главная
Study mode:
on
1
Intro
2
Acknowledgements
3
Team
4
Objectives for Protected Execution Facility
5
Creating and Running SVM
6
Base Principles
7
Overview of architecture
8
Architecture implication for the hypervisor
9
Architecture at the VM level
10
Revocation
11
Limitations
12
Contents of ESM blob
13
SVM format and Booting
14
Steps to start Secure VM
15
Boot Changes
16
Interfaces to the Ultravior ultra calls
17
KVM Changes
18
Kernel Changes
19
Brief Introduction to some of the hardware changes
20
Summary of Protected Execution Facility
21
Relevant IBM secure processor products and Research
Description:
Explore the Protected Execution Facility, an architectural modification for IBM Linux and OpenPower Linux servers, in this informative conference talk by Guerney D. H. Hunt from IBM Research. Delve into the challenges of keeping applications and containers secure in the face of attacks and compromised components. Learn about the associated firmware, the Protected Execution Ultravisor, which provides additional security to virtual machines, known as secure virtual machines (SVMs). Discover how this facility supports both normal VMs and SVMs concurrently, and understand the protections and restrictions applied to SVMs. Compare vendor approaches to providing security in potentially compromised hypervisor or OS environments. Gain insights into creating and running SVMs, base principles, architecture implications, revocation, limitations, and boot changes. Examine interfaces to the Ultravisor ultra calls, KVM changes, kernel modifications, and hardware alterations. Conclude with a summary of the Protected Execution Facility and an overview of relevant IBM secure processor products and research. Read more

Protected Execution Facility: Enhancing Security for Virtual Machines

Linux Foundation
Add to list
0:00 / 0:00