Lecture

Trusted Computing: Information Security and Privacy

Description

This lecture covers the fundamentals of trusted computing, focusing on the need for trusted hardware, guarantees provided by trusted computing, threat models, and key technologies. It explores concepts like confidential computing, trusted execution environments, and the role of hardware secure modules. The lecture also delves into examples of trusted platform modules, attestation, sealing, and side-channel attacks, using real-world cases like private contact discovery in Signal. The instructor discusses the challenges of ensuring security in offline payments, the vulnerabilities of trusted hardware, and the mitigation strategies against side-channel attacks like Meltdown and Spectre.

This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.

Watch on Mediaspace
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.