Download pdf
Trusted Execution Environments (TEEs) implement safe data processing environments inside untrusted or compromised computers. They can be used for confidential data processing in public clouds where they protect encrypted code and data from malicious administrators and hackers. This talk will describe architectures, runtimes, compilers and tooling for the creation of confidential computing services using TEEs.

Learning Objectives:
1: Learn about secure enclave technologies,
2: Understand application use cases for secure enclaves.
3: Learn the components of a confidential computing architecture.