Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the fundamentals of trusted computing, focusing on the need for trusted hardware, guarantees provided by trusted computing, threat models, and key technologies. It explores concepts like confidential computing, trusted execution environments, and the role of hardware secure modules. The lecture also delves into examples of trusted platform modules, attestation, sealing, and side-channel attacks, using real-world cases like private contact discovery in Signal. The instructor discusses the challenges of ensuring security in offline payments, the vulnerabilities of trusted hardware, and the mitigation strategies against side-channel attacks like Meltdown and Spectre.
This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.
Watch on Mediaspace