Google AI Professional Certificate - Learn AI Skills That Get You Hired
AI Adoption - Drive Business Value and Organizational Impact
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 36-minute Black Hat conference talk that delves into critical vulnerabilities discovered in Intel's Trusted Domain Extensions (TDX) Confidential Compute technology. Learn about the internal workings of TDX and follow Microsoft security researchers' methodical review process, including their custom emulation tooling development and testing strategies. Discover how their initial findings led to the identification of critical security flaws that enable malicious cloud providers to bypass confidentiality and integrity protections, potentially compromising sensitive customer data like financial information, medical records, and proprietary AI models. Gain insights into the successful exploitation technique achieving full privilege escalation into TDX firmware, understand Intel's implemented fixes, and receive guidance for conducting further security research on TDX technology.
Syllabus
Compromising Confidential Compute, One Bug at a Time
Taught by
Black Hat