Overview
This tech talk from the Confidential Computing Consortium explores the critical question of hardware and firmware trustworthiness in modern computing systems. Delve into the security challenges, trust models, and verification methods that underpin our reliance on computing hardware and firmware components. Learn about the potential vulnerabilities that exist at the hardware level, how these can impact confidential computing initiatives, and what measures are being developed to establish stronger trust guarantees. Suitable for security professionals, system architects, and anyone interested in the foundational security aspects of computing infrastructure.
Syllabus
Why should we trust computing hardware/firmware? - Tech Talk
Taught by
Confidential Computing Consortium