Explore Intel Trust Domain Extensions (TDX) and learn how to run or emulate a modified TDX module without SEAM in this informative conference talk. Dive into the intricacies of TDX, which isolates virtual machines from inspection or modification by the VMM and other software to protect privacy, confidentiality, and integrity. Understand the role of the signed TDX module firmware and its APIs in managing protected guest states. Examine the dilemma between security and convenience in TDX module implementation, and discover potential solutions for mitigating this issue. Learn about the environment in which the TDX module operates and compare various methods for running modified versions. Gain insights into techniques that enable TDX development without the stringent requirements of production systems, allowing for greater flexibility in Intel TDX experimentation and research.
Overview
Syllabus
Allowing an Intel TDX Module to Run Without SEAM - Isaku Yamahata, Intel
Taught by
Linux Foundation