Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
This talk explores the design space, security and performance tradeoffs of attested TLS protocols, which are essential for confidential computing solutions. Discover the ongoing standardization efforts in the IETF for these protocols and learn about the security properties required from attestation frameworks. See how formalization can help achieve strong security guarantees in confidential computing environments. Gain valuable best practices for implementing attested TLS specifically to enhance the Arm CCA (Confidential Computing Architecture) ecosystem. The presentation provides insights for developers and security professionals working with confidential computing technologies.
Syllabus
LIS25 228 Attested TLS design space, tradeoffs and standardization
Taught by
LinaroOrg