Why you need to protect your confidential virtual machine from itself | Ubuntu
The new threat model of confidential computing In the traditional computing threat model, privileged system software like the hypervisor, host OS, firmware, and DMA-capable devices were...