Confidential computing enables users to authenticate code running in TEEs, but users also need evidence this code is trustworthy.
Antoine Delignat-Lavaud, Cédric Fournet, Kapil Vaswani, Sylvan Clebsch, Maik Riechert, Manuel Costa, Mark Russinovich From Communications of the ACM | January 2024