πŸ“ƒ
Confidential Computing 101
search
⌘Ctrlk
Homechevron-downTechnologychevron-downTry CC!
πŸ“ƒ
Confidential Computing 101
  • Welcome
  • Confidential Computing
    • What is Confidential Computing
    • What problems Confidential Computing solves
    • Why Confidential Computing
    • How Confidential Computing works
    • Technology Overview
    • Cloud Service Providers
  • Technology in depth
    • Intel SGX
    • Intel TDX
    • AMD SEV
      • Getting Started
      • Technology
        • History
        • Threat Model
        • SME Concepts
        • SEV-SNP Concepts
          • Features
            • Integrity Threats
            • Reverse Map Table
            • Page Validation
            • Page States
            • Virtual Machine Privilege Levels
            • Interrupt/Exception Protection
            • Trusted Platform Information
            • TCB Versioning
            • VM Launch & Attestation
            • VM Migration
            • Side Channels
          • Use Cases
          • Architecture
          • Software Implications
    • ARM CC
    • Attestation Methods
  • Resources
    • Youtubearrow-up-right
    • Githubarrow-up-right
    • Productsarrow-up-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Technology in depthchevron-right
  2. AMD SEVchevron-right
  3. Technologychevron-right
  4. SEV-SNP Concepts

Features

Integrity Threatschevron-rightReverse Map Tablechevron-rightPage Validationchevron-rightPage Stateschevron-rightVirtual Machine Privilege Levelschevron-rightInterrupt/Exception Protectionchevron-rightTrusted Platform Informationchevron-rightTCB Versioningchevron-rightVM Launch & Attestationchevron-rightVM Migrationchevron-rightSide Channelschevron-right

Last updated 1 year ago

Was this helpful?

Was this helpful?