Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich From Communications of the ACM | January 2024
Extending hardware-enforced cryptographic protection to data while in use.
Mark Russinovich, Manuel Costa, Cédric Fournet, David Chisnall, Antoine Delignat-Lavaud, Sylvan Clebsch, Kapil Vaswani, Vikas Bhatia From Communications of the ACM | June 2021