{"guid":"b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","title":"The challenges of Protected Virtualization","subtitle":null,"slug":"36c3-107-the-challenges-of-protected-virtualization","link":"https://fahrplan.chaos-west.de/36c3/talk/73DECY/","description":"Firmware protection for Virtual Machines against buggy or malicious\nhypervisors is a rather new concept that is quickly gaining traction\namong the major CPU architectures; two years ago AMD introduced Secure Encrypted Virtualization (AMD SEV), and now IBM is introducing Protected Virtualization for the s390x architecture.\n\nThis talk will present the motivations and the overall architecture of\nProtected Virtualization, the general challenges for Linux both as a guest and as a hypervisor with KVM and Qemu.\n\nThe main challenges presented will be, among others:\n* secure VM startup\n* attestation\n* I/O\n* interrupts\n* Linux guest support\n* KVM and Qemu changes\n* swap and migration\n\nWhile the talk will have some technical content, it should be enjoyable for anyone who tinkers with KVM and virtualization.\n\nKnowledge of the s390x architecture is not required.","original_language":"eng","persons":["Janosch Frank","Claudio Imbrenda"],"view_count":555,"promoted":false,"date":"2019-12-27T18:00:00.000+01:00","release_date":"2019-12-30T01:00:00.000+01:00","updated_at":"2026-02-21T06:00:02.837+01:00","tags":["36c3-chaoswest","107","2019","All about computers","ChaosWest"],"length":2441,"duration":2441,"thumb_url":"https://static.media.ccc.de/media/congress/2019/chaoswest/107-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2019/chaoswest/107-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2019/chaoswest/107-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2019/chaoswest/107-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/36c3-107-the-challenges-of-protected-virtualization","url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_title":"36C3: Resource Exhaustion","conference_url":"https://api.media.ccc.de/public/conferences/36c3","related":[],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"DRAFT_36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization.en_DRAFT.srt","state":"todo","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2024-01-21T16:03:32.585+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/DRAFT_36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization.en_DRAFT.srt","url":"https://api.media.ccc.de/public/recordings/47949","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":78,"length":2441,"mime_type":"video/mp4","language":"eng","filename":"36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-01-10T23:08:48.036+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-sd/36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_sd.mp4","url":"https://api.media.ccc.de/public/recordings/45076","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":471,"length":2441,"mime_type":"video/webm","language":"eng","filename":"36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2020-01-10T23:08:37.899+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/webm-hd/36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/45075","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":22,"length":2423,"mime_type":"audio/opus","language":"eng","filename":"36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2020-01-10T23:07:37.363+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/opus/36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_opus.opus","url":"https://api.media.ccc.de/public/recordings/45074","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":36,"length":2423,"mime_type":"audio/mpeg","language":"eng","filename":"36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2020-01-10T23:07:23.039+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/mp3/36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/45073","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":126,"length":2441,"mime_type":"video/webm","language":"eng","filename":"36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2020-01-10T23:07:14.662+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/webm-sd/36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/45072","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":403,"length":2441,"mime_type":"video/mp4","language":"eng","filename":"36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-30T19:50:24.597+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-chaoswest-107-eng-The_challenges_of_Protected_Virtualization_hd.mp4","url":"https://api.media.ccc.de/public/recordings/43765","event_url":"https://api.media.ccc.de/public/events/b1f5ca8d-78ff-5e80-b301-4e8ae0ae6c8b","conference_url":"https://api.media.ccc.de/public/conferences/36c3"}]}