Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Improving Side-Channel Protections for Intel TDX

Black Hat via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This Black Hat conference talk explores the concept of "single-stepping" in confidential computing and its security implications for Intel Trust Domain Extensions (TDX). Dive into how malicious operating systems or virtual machine monitors can exploit timer interrupts or faults to execute instructions one at a time within trusted execution environments, potentially exposing timing and power side channels. Learn about the evolution of Intel's protections against these attacks, including the initial mitigation, two different bypass methods discovered by researchers, and the enhanced countermeasures implemented in newer TDX firmware. Experience four demonstrations illustrating the real-world cat-and-mouse game between malicious VMMs and TDX trust domains. Presented by Intel security experts Scott Constable, Nagaraju Kodalapura, and Baruch Chaikin, this 45-minute session provides valuable insights for security professionals working with confidential computing technologies.

Syllabus

Improving Side-Channel Protections for Intel TDX

Taught by

Black Hat

Reviews

Start your review of Improving Side-Channel Protections for Intel TDX

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.