Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Compromising Confidential Compute Through TDX Vulnerabilities - Security Research Analysis

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a 36-minute Black Hat conference talk that delves into critical vulnerabilities discovered in Intel's Trusted Domain Extensions (TDX) Confidential Compute technology. Learn about the internal workings of TDX and follow Microsoft security researchers' methodical review process, including their custom emulation tooling development and testing strategies. Discover how their initial findings led to the identification of critical security flaws that enable malicious cloud providers to bypass confidentiality and integrity protections, potentially compromising sensitive customer data like financial information, medical records, and proprietary AI models. Gain insights into the successful exploitation technique achieving full privilege escalation into TDX firmware, understand Intel's implemented fixes, and receive guidance for conducting further security research on TDX technology.

Syllabus

Compromising Confidential Compute, One Bug at a Time

Taught by

Black Hat

Reviews

Start your review of Compromising Confidential Compute Through TDX Vulnerabilities - Security Research Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.