Overview
Syllabus
Introduction
Agenda
Problem Statement
Security Landscape
Goal
Concerns
Sensitive Data
Hardware Assisted Virtualization
Integrity Protection
Design Principles
Trusted Execution Environment TEA
HSM
Trusted Protection Modules
Programmability
Use Cases
Confidential AI for Healthcare
Confidential Computing
Trusted Execution Environment Properties
Unit of Isolation
Programmable Te
Implementation Solutions
Trusted Execution
attestation flows
field examples
What is good to have
Combined example
Tee example
Key takeaways
Audience questions
Closing remarks
Taught by
RSA Conference