USENIX Security ’25 (Enigma Track) – Trusted Hardware For Al Workloads: Extending Confidential Computing To Enable Al Adoption


Author, Creator & Presenter: Shannon Egan, Deep Science VenturesAs companies race to adopt AI in new use cases, hardware vendors and cloud providers are developing the protocols to secure AI workloads with limited input from the broader security com

[…Keep reading]

Fake Claude Code install pages hit Windows and Mac users with infostealers

Fake Claude Code install pages hit Windows and Mac users with infostealers

Author, Creator & Presenter: Shannon Egan, Deep Science VenturesAs companies race to adopt AI in new use cases, hardware vendors and cloud providers are developing the protocols to secure AI workloads with limited input from the broader security community. This talk surveys key challenges of extending Confidential Computing and Trusted Execution Environments from CPUs to clusters of AI accelerators, highlighting technical contributions needed from security experts: efficient remote attestation and key management, secure interconnects, and device memory protection. These advancements would enable stronger security guarantees while maintaining performance and code compatibility–crucial requirements for commercial adoption. We draw from our experience evaluating market opportunities for emerging technologies to offer a unique perspective on both the commercial potential and technical feasibility of trusted hardware for large-scale AI.

Our thanks to USENIX Security ’25 (Enigma Track) (USENIX ’25 for publishing their Creators, Authors and Presenter’s tremendous USENIX Security ’25 (Enigma Track) content on the Organizations’ YouTube Channel.

Permalink

*** This is a Security Bloggers Network syndicated blog from Infosecurity.US authored by Marc Handelman. Read the original post at: https://www.youtube-nocookie.com/embed/MLPrgiR5VQM?si=2Ggw2hnP9FzFWGuo

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.