Overview
Explore device attestation in hardware TEE-based confidential computing through this 30-minute conference talk by Intel experts. Learn about protecting data in use within Trusted Execution Environments (TEEs) and the process of securely transferring workloads from TEE virtual machines to accelerator devices. Discover the device attestation model, its application in TEE VMs, and the methods for collecting and verifying device identity and evidence information. Gain insights into maintaining workload confidentiality and ensuring authentic device communication with expected security status before offloading tasks.
Syllabus
Device Attestation in Hardware TEE based Confidential Computing - Jiewen Yao & Jun Nakajima, Intel
Taught by
Linux Foundation