Loading…
Attending this event?
Back To Schedule
Friday, June 16 • 11:15am - 11:50am
Chains of trust in Confidential Computing

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Confidential Computing is a set of technologies such as memory encryption that can be used to protect data in use.

This technology can be used in a number of ways, notably to implement Confidential Virtual Machines, Confidential Containers and Confidential Clusters. This talk explores the various chains of trust required to preserve confidentiality in each of these use cases. In each scenario, we will describe the root of trust, what is being proven, who verifies the proof, and what a successful verification allows, We will discuss techniques and technologies such as local and remote attestation, firmware-based certification, the use and possible implementations of a virtual TPM, attested TLS. We will also discuss the different requirements to attest an execution environment, a workload, a user, or a node joining a cluster.

Speakers
avatar for Christophe de Dinechin

Christophe de Dinechin

Senior Principal Software Engineer, Red Hat
Working on Kata Containers and OpenShift sandboxed containers Areas of interest: programming languages (XL), interactive 3D graphics and stereoscopy (Tao3D), physics research (theory of incomplete measurements) More info on http://c3d.github.io


Friday June 16, 2023 11:15am - 11:50am CEST
E104 | Talks
Feedback form isn't open yet.