WebAssembly + Confidential Computing
Enarx first release brings WebAssembly to Confidential Computing
- Track: Hardware-Aided Trusted Computing devroom
- Room: D.trusted-hardware
- Day: Saturday
- Start: 10:55
- End: 11:20
- Video with Q&A: D.trusted_hardware
- Video only: D.trusted_hardware
- Chat: Join the conversation!
The Enarx project reached a huge milestone: its first official release, featuring WebAssembly runtime. WebAssembly and Confidential Computing are a great match because WebAssembly offers developers a wide range of language choices, it works across silicon architectures, and it provides a sandboxed environment. This presentation will highlight the benefits of WebAssembly to Confidential Computing and showcase some demos.
After 3 years since its inception, the Enarx project finally had its first official release, bringing WebAssembly to Confidential Computing.
Enarx is a deployment framework for running applications in TEE instances – which we refer to as “Keeps” – without the need to trust lots of dependencies, without the need to rewrite the application, and without the need to implement attestation separately.
The WebAssembly runtime, based on wasmtime, offers developers a wide range of language choices for implementation, including Rust, C, and C++. It is designed to work across silicon architectures transparently to the user so that the application can run equally simple on Intel platforms (SGX or the recently-announced TDX), AMD platforms (SEV) or forthcoming platforms such as Arms’ Realms and IBM’s PEF - all without having to recompile the application code. WebAssembly's sandbox model offers an extra layer of protection, isolating the application from the host.
Speakers
Nick Vidal |