Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Design and Verification of the Arm Confidential Compute Architecture

USENIX via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the design and verification of the Arm Confidential Compute Architecture in this 19-minute conference talk from OSDI '22. Delve into the innovative Realms abstraction, a new approach to confidential computing that protects data confidentiality and integrity of virtual machines. Learn how hardware creates and enforces the Realm world, a separate physical address space for Realms, while firmware secures them and manages requests from untrusted system software. Discover novel verification techniques used to prove the security and correctness of concurrent software with complex features such as hand-over-hand locking, dynamically allocated shared page tables, and data races in kernel code running on relaxed memory hardware. Gain insights into the integration of C and Arm assembly code, and how untrusted software maintains control of system resource allocation while being prevented from accessing Realm memory contents. Understand the significance of this technology as part of the Arm Confidential Compute Architecture and its potential impact on data privacy in computing.

Syllabus

OSDI '22 - Design and Verification of the Arm Confidential Compute Architecture

Taught by

USENIX

Reviews

Start your review of Design and Verification of the Arm Confidential Compute Architecture

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.