ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

#35 SGX | Part 1 | Information Security 5 Secure Systems Engineering

Автор: NPTEL-NOC IITM

Загружено: 2019-05-06

Просмотров: 10399

Описание: Welcome to 'Information Security 5 Secure Systems Engineering' course !

This lecture introduces Intel SGX (Software Guard Extensions), a hardware-based TEE implemented in Intel processors. It begins by comparing SGX to ARM TrustZone, highlighting SGX's ability to provide stronger isolation through features like encrypted memory. The lecture then explains the concept of enclaves, secure sandboxes within SGX that protect the confidentiality and integrity of code and data. It explores how SGX utilizes Processor Related Memory (PRM), a protected region of RAM inaccessible to the operating system, to store enclave data and metadata structures. Viewers will learn about the fundamental principles of SGX and how it establishes secure execution environments within potentially compromised systems. .
NPTEL Courses permit certifications that can be used for Course Credits in Indian Universities as per the UGC and AICTE notifications.

To understand various certification options for this course, please visit https://nptel.ac.in/courses/106106199

#IntelSGX #Enclaves #SecureSandbox #Confidentiality #Integrity #ProcessorRelatedMemory #PRM #EncryptedMemory #HardwareSecurity

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
#35 SGX | Part 1 | Information Security 5 Secure Systems Engineering

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

#36  SGX | Part 2 | Information Security 5 Secure Systems Engineering

#36 SGX | Part 2 | Information Security 5 Secure Systems Engineering

#39 PUF | Part 3 | Information Security 5 Secure Systems Engineering

#39 PUF | Part 3 | Information Security 5 Secure Systems Engineering

#37 PUF | Part 1 | Information Security 5 Secure Systems Engineering

#37 PUF | Part 1 | Information Security 5 Secure Systems Engineering

TPM (Trusted Platform Module) - Computerphile

TPM (Trusted Platform Module) - Computerphile

#9 Preventing Buffer Overflows | Canaries & W^X | Information Security 5 Secure Systems Engineering

#9 Preventing Buffer Overflows | Canaries & W^X | Information Security 5 Secure Systems Engineering

Stanford Seminar - Intel Software Guard Extensions

Stanford Seminar - Intel Software Guard Extensions

SGX Secure Enclaves: The Future of Application Security in the Cloud

SGX Secure Enclaves: The Future of Application Security in the Cloud

6 TrustZone and secure hello world

6 TrustZone and secure hello world

#11 Return Oriented Programming Attacks | Information Security 5 Secure Systems Engineering

#11 Return Oriented Programming Attacks | Information Security 5 Secure Systems Engineering

#10 Return to Libc Attacks | Information Security 5 Secure Systems Engineering

#10 Return to Libc Attacks | Information Security 5 Secure Systems Engineering

Виртуальные машины против контейнеров

Виртуальные машины против контейнеров

#34 ARM Trustzone | Information Security 5 Secure Systems Engineering

#34 ARM Trustzone | Information Security 5 Secure Systems Engineering

#38 PUF | Part 2 | Information Security 5 Secure Systems Engineering

#38 PUF | Part 2 | Information Security 5 Secure Systems Engineering

Platform Security–A Detailed Comparison of RISC-V to ARM’s TrustZone

Platform Security–A Detailed Comparison of RISC-V to ARM’s TrustZone

Intel - From Inventors of the CPU to Laughing Stock [Part 1]

Intel - From Inventors of the CPU to Laughing Stock [Part 1]

Структура файлов и каталогов в Linux

Структура файлов и каталогов в Linux

Architecture All Access: Modern CPU Architecture Part 1 – Key Concepts | Intel Technology

Architecture All Access: Modern CPU Architecture Part 1 – Key Concepts | Intel Technology

#33 Trusted Execution Environments | Information Security 5 Secure Systems Engineering

#33 Trusted Execution Environments | Information Security 5 Secure Systems Engineering

#2 Program Binaries | Information Security 5 Secure Systems Engineering

#2 Program Binaries | Information Security 5 Secure Systems Engineering

Demystifying the Secure Enclave Processor

Demystifying the Secure Enclave Processor

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]