- Nyhet
Beskrivning
At present, major companies are launching their own confidential computing solutions, which pose significant challenges to users. This book summarizes the common designs of various mainstream TEE hardware, and explains their commonalities to help understand the working principles of TEE hardware, facilitating users to define TEE usage scenarios through abstract commonalities.
Confidential Computing: Principles and Technology comprehensively introduces the design principles and usage methods of TEE in terms of security models, lifecycle, attestation models, attack methods, and mitigation strategies, helping readers understand the security attributes and implementation points of confidential computing. At the same time, this book takes the TEE provided by the mainstream X86, ARM, and RISC-V architectures in the industry as examples to analyze the specific implementation methods and similarities and differences of hardware TEE, helping users deeply understand the advantages and disadvantages of different implementations, and hoping to provide some inspiration for future TEE software and hardware designers.
Confidential Computing: Principles and Technology comprehensively introduces the design principles and usage methods of TEE in terms of security models, lifecycle, attestation models, attack methods, and mitigation strategies, helping readers understand the security attributes and implementation points of confidential computing. At the same time, this book takes the TEE provided by the mainstream X86, ARM, and RISC-V architectures in the industry as examples to analyze the specific implementation methods and similarities and differences of hardware TEE, helping users deeply understand the advantages and disadvantages of different implementations, and hoping to provide some inspiration for future TEE software and hardware designers.
- Provides a common confidential computing TEE model and principles
- Covers different solutions, including X86 (SGX, TDX, SEV), ARM and RISC-V
- Includes different attacks and mitigation examples
- Reviews both TEE and advanced TEE-IO solutions, including industry standards on TCG, DMTF, PCI, CXL