w_thbc01

(lvitn) #1

  • Development Against Standard Enclaving Abstractions


Use the Open Enclave SDK to build applications that protect against different types of
enclave with a consistent API surface that surrounds an enclaving abstraction and
provides support for portability and flexibility in architecture.



  • Verify TEE Identities


Along with validating the code inside them to determine whether secrets can be released
or not. Verification is very easy and available using attestation services.



  • Harden Enclave Code With Microsoft Research Insights


Explore the research released on new confidential computing apps, techniques for
hardening TEE apps and tips on how to stop information from leaking out of the TEE.


Application Patterns of Confidential Computing



  • Protect the integrity and confidentiality of data using, for example, SQL Server
    Always Encrypted technology

  • Create trusted networks using, for example, Confidential Consortium Blockchain
    Framework.

  • Combine multiple sources of data using, for example, secure multiparty machine
    learning

  • Protect sensitive IP code using, for example, secured content licensing and DRM
    protection.

Free download pdf