Confidential Computing

Intel Software Guard Extensions

Intel SGX Explained

I have more 1 to say.2


  1. VanNostrand, P. M., Kyriazis, I., Cheng, M., Guo, T., & Walls, R. J. (2019). Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices. Retrieved from http://arxiv.org/abs/1908.10730

  2. Brasser, F., Frassetto, T., Riedhammer, K., Sadeghi, A. R., Schneider, T., & Weinert, C. (2018). VoiceGuard: Secure and private speech processing. Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH, 2018-Septe, 1303–1307. https://doi.org/10.21437/Interspeech.2018-2032