Confidential Computing

Intel Software Guard Extensions

Intel SGX Explained

I have more 1 to say.2

  1. VanNostrand, P. M., Kyriazis, I., Cheng, M., Guo, T., & Walls, R. J. (2019). Confidential Deep Learning: Executing Proprietary Models on Untrusted Devices. Retrieved from

  2. Brasser, F., Frassetto, T., Riedhammer, K., Sadeghi, A. R., Schneider, T., & Weinert, C. (2018). VoiceGuard: Secure and private speech processing. Proceedings of the Annual Conference of the International Speech Communication Association, INTERSPEECH, 2018-Septe, 1303–1307.