Главная
Study mode:
on
1
Introduction
2
Agenda
3
Why Harden
4
Methodology
5
Approach
6
MSR
7
cpids
8
portal
9
mmio
10
PCI config space
11
KVM specific inputs
12
Shared Memory
13
Randomness
14
Timers
15
ICPI
16
Panic
17
Memory Management
18
Transit Execution Attacks
19
Example
20
Results
21
Discussion Point
22
Documentation
Description:
Explore the intricacies of hardening Linux guest systems for confidential cloud computing in this 50-minute technical deep dive presented by Elena Reshetova from Intel. Delve into the evolving security landscape where cloud tenants no longer need to trust the software stack provided by Cloud Service Providers. Examine the efforts to enhance the mainline Linux kernel for use as a secure VM guest kernel, focusing on the treatment of individual kernel subsystems and communication mechanisms. Learn about implemented hardening security mechanisms and gain insights from fuzzing and manual code audit activities. Discover open-source tools and documentation for the project, and engage with discussion points on memory management, transit execution attacks, and other critical aspects of Linux guest hardening for confidential cloud environments.

Hardening Linux for Confidential Cloud Computing - Deep Dive and Results

Linux Foundation
Add to list
0:00 / 0:00