Trusted Execution Environments (TEEs) implement safe data processing environments inside untrusted or compromised computers. They can be used for confidential data processing in public clouds where they protect encrypted code and data from malicious administrators and hackers. This talk will describe architectures, runtimes, compilers and tooling for the creation of confidential computing services using TEEs.
1: Learn about secure enclave technologies,
2: Understand application use cases for secure enclaves.
3: Learn the components of a confidential computing architecture.
Protecting Data & Applied Crypto
Share With Your Community