📃
Confidential Computing 101
Ctrlk
HomeTechnologyTry CC!
  • Welcome
  • Confidential Computing
    • What is Confidential Computing
    • What problems Confidential Computing solves
    • Why Confidential Computing
    • How Confidential Computing works
    • Technology Overview
    • Cloud Service Providers
  • Technology in depth
    • Intel SGX
    • Intel TDX
    • AMD SEV
      • Getting Started
      • Technology
        • History
        • Threat Model
        • SME Concepts
        • SEV-SNP Concepts
          • Features
            • Integrity Threats
            • Reverse Map Table
            • Page Validation
            • Page States
            • Virtual Machine Privilege Levels
            • Interrupt/Exception Protection
            • Trusted Platform Information
            • TCB Versioning
            • VM Launch & Attestation
            • VM Migration
            • Side Channels
          • Use Cases
          • Architecture
          • Software Implications
    • ARM CC
    • Attestation Methods
  • Resources
    • Youtube
    • Github
    • Products
Powered by GitBook
On this page

Was this helpful?

  1. Technology in depth
  2. AMD SEV
  3. Technology
  4. SEV-SNP Concepts

Features

Integrity ThreatsReverse Map TablePage ValidationPage StatesVirtual Machine Privilege LevelsInterrupt/Exception ProtectionTrusted Platform InformationTCB VersioningVM Launch & AttestationVM MigrationSide Channels

Last updated 1 year ago

Was this helpful?