Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds

Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds

Linux Foundation via YouTube Direct link

INTEL TDX-SW DEPLOYMENT MODELS

20 of 26

20 of 26

INTEL TDX-SW DEPLOYMENT MODELS

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Architectural Extensions for Hardware Virtual Machine Isolation to Advance Confidential Computing in Public Clouds

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 CLOUD THREAT VECTORS
  3. 3 HARDWARE-BASED CLOUD WORKLOAD ISOLATION EVOLUTION
  4. 4 INTEL TDX-HIGH LEVEL SECURITY GOAL OF ARCHITECTURE
  5. 5 CPU ISA
  6. 6 VMX AND SEAM
  7. 7 THREAT MODEL
  8. 8 TD MEMORY CONFIDENTIALITY
  9. 9 TD MEMORY INTEGRITY
  10. 10 PRIVATE KEY MANAGEMENT
  11. 11 HW ADDRESS TRANSLATION
  12. 12 PHYSICAL MEMORY MANAGEMENT
  13. 13 ATTESTATION LEVERAGES INTEL SGX
  14. 14 THREAT COVERAGE - SOFTWARE ADVERSARY ATTACKS
  15. 15 THREAT COVERAGE - HARDWARE ADVERSARY ATTACKS
  16. 16 THREAT COVERAGE-TOX MODULE AND ATTESTATION ATTACKS
  17. 17 THREAT COVERAGE - SIDECHANNEL ATTACKS
  18. 18 INTEL TDX -PUTTING IT ALL TOGETHER
  19. 19 INTEL TDX SOFTWARE IMPLICATIONS
  20. 20 INTEL TDX-SW DEPLOYMENT MODELS
  21. 21 KVM TOUCHPOINTS
  22. 22 MORE ON MMU
  23. 23 LINUX TD GUEST TOUCHPOINTS
  24. 24 GHCI (GUEST-HYPERVISOR COMMUNICATION INTERFACE)
  25. 25 INTEL TDX PLATFORM AND SW LIFECYCLE
  26. 26 SUMMARY

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.