Lines Matching refs:its
27 of data in use (vs. data at rest or data in transit). At its core, CoCo
39 inside a CoCo VM. Namely, confidential computing allows its users to
40 confirm the trustworthiness of all SW pieces to include in its reduced
41 Trusted Computing Base (TCB) given its ability to attest the state of these
59 VM, manage its access to system resources, etc. However, since it
60 typically stays out of CoCo VM TCB, its access is limited to preserve the
110 its TCB. The primary attacker resides in the userspace, and all of the data
125 Confidential Computing threat model and its security objectives
131 CoCo VM TCB due to its large SW attack surface. It is important to note
201 data should also be considered untrusted until its integrity and
246 is that this input is not malformed, but its value is crafted to
250 be an attack vector on its own, if it results in a particular guest