{"id":648207,"date":"2020-05-15T05:46:38","date_gmt":"2020-05-15T12:46:38","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-project&#038;p=648207"},"modified":"2023-02-15T01:10:13","modified_gmt":"2023-02-15T09:10:13","slug":"confidential-ai","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/confidential-ai\/","title":{"rendered":"Confidential AI"},"content":{"rendered":"<section class=\"mb-3 moray-highlight\">\n\t<div class=\"card-img-overlay mx-lg-0\">\n\t\t<div class=\"card-background  has-background- card-background--full-bleed\">\n\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"720\" src=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI.jpg\" class=\"attachment-full size-full\" alt=\"Confidential AI graphic\" style=\"\" srcset=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI.jpg 1920w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI-300x113.jpg 300w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI-1024x384.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI-768x288.jpg 768w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI-1536x576.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2020\/05\/ConfAI-1600x600.jpg 1600w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/>\t\t<\/div>\n\t\t<!-- Foreground -->\n\t\t<div class=\"card-foreground d-flex mt-md-n5 my-lg-5 px-g px-lg-0\">\n\t\t\t<!-- Container -->\n\t\t\t<div class=\"container d-flex mt-md-n5 my-lg-5 align-self-center\">\n\t\t\t\t<!-- Card wrapper -->\n\t\t\t\t<div class=\"w-100 w-lg-col-5\">\n\t\t\t\t\t<!-- Card -->\n\t\t\t\t\t<div class=\"card material-md-card py-5 px-md-5\">\n\t\t\t\t\t\t<div class=\"card-body \">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/theme\/confidential-computing\/\" class=\"icon-link icon-link--reverse mb-2\" data-bi-cN=\"Confidential Computing\">\n\t\t\t\t\t\t\t\t\t<span class=\"c-glyph glyph-chevron-left\" aria-hidden=\"true\"><\/span>\n\t\t\t\t\t\t\t\t\tConfidential Computing\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\n\n<h1 id=\"confidential-ai\" class=\"h2\">Confidential AI<\/h1>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\n\n<p>Our goal is to make Azure the most trustworthy cloud platform for AI. The platform we envisage offers confidentiality and integrity against privileged attackers including attacks on the code, data and hardware supply chains, performance close to that offered by GPUs, and programmability of state-of-the-art ML frameworks. The confidential AI platform will enable multiple entities to collaborate and train accurate models using sensitive data, and serve these models with assurance that their data and models remain protected, even from privileged attackers and insiders. Accurate AI models will bring significant benefits to many sectors in society. For example, these models will enable better diagnostics and treatments in the healthcare space and more precise fraud detection for the banking industry.<\/p>\n\n\n\n<p><strong>Confidential AI platform&nbsp;<\/strong><\/p>\n\n\n\n<p>The first goal of confidential AI is to develop the confidential computing platform. Today, such platforms are offered by select hardware vendors, e.g., Intel SGX. Our research investigates how confidential computing features can be supported by accelerators such as GPUs, container technology, rich language runtimes, and ML frameworks.<\/p>\n\n\n\n<p><strong>Privacy and robustness of ML models<\/strong><\/p>\n\n\n\n<p>The second goal of confidential AI is to develop defenses against vulnerabilities that are inherent in the use of ML models, such as leakage of private information via inference queries, or creation of adversarial examples. We investigate novel algorithmic or API-based mechanisms for detecting and mitigating such attacks, with the goal of maximizing the utility of data without compromising on security and privacy.<\/p>\n\n\n\n<p><strong>Data governance and compliance<\/strong><\/p>\n\n\n\n<p>The third goal of confidential AI is to develop techniques that bridge the gap between the technical guarantees given by the Confidential AI platform and regulatory requirements on privacy, sovereignty, transparency, and purpose limitation for AI applications.<\/p>\n\n\n\n\n\n<p>\t\t\t<div class=\"ms-grid \">\n\t\t\t<div class=\"ms-row\">\n\t\t\t\t\t<div  class=\"m-col-12-24\" >\n\t\t<p>Azure Responds to COVID-19 with confidential multi-party training<\/p><p><iframe loading=\"lazy\" title=\"Azure Responds to COVID-19\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/eM1XN1dzp9Q?start=2023&feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t<div  class=\"m-col-12-24\" >\n\t\t<p>Building a healthcare platform with confidential containers and confidential inference<\/p><p><iframe loading=\"lazy\" title=\"Confidential containers on Azure Kubernetes Service\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/PiYCQmOh0EI?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<br>\n\t\t\t<div class=\"ms-grid \">\n\t\t\t<div class=\"ms-row\">\n\t\t\t\t\t<div  class=\"m-col-12-24\" >\n\t\t<p>New developments for protecting data in use with Azure Confidential Computing<\/p><p><iframe loading=\"lazy\" title=\"New developments for protecting data in use with Azure Confidential Computing\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/kAiH0T9Uw9g?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t<div  class=\"m-col-12-24\" >\n\t\t<p>Confidential ML Deep Dive with Antoine<\/p><p><iframe loading=\"lazy\" title=\"Confidential Machine Learning Deep-Dive\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/4lh-0x3Jsls?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<br>\n\t\t\t<div class=\"ms-grid \">\n\t\t\t<div class=\"ms-row\">\n\t\t\t\t\t<div  class=\"m-col-12-24\" >\n\t\t<p>Confidential Machine Learning Intro with Sylvan<\/p><p><iframe loading=\"lazy\" title=\"Confidential ML | AI Show\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/WfVkDKTXkO8?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t<div  class=\"m-col-12-24\" >\n\t\t<p>Secure Multi-Party AI Showcase with Stavros<\/p><p><iframe loading=\"lazy\" title=\"Tech Showcase: Confidential AI: Secure Multi-Party Artificial Intelligence\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/o1FV56s-Qvw?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<br>\n\t\t\t<div class=\"ms-grid \">\n\t\t\t<div class=\"ms-row\">\n\t\t\t\t\t<div  class=\"m-col-12-24\" >\n\t\t<p>Azure Confidential Computing Intro<\/p><p><iframe loading=\"lazy\" title=\"Introducing Azure confidential computing\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/rT6zMOoLEqI?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t<div  class=\"m-col-12-24\" >\n\t\t<p>The Rise of Confidential Computing with Mark Russinovich<\/p><p><iframe loading=\"lazy\" title=\"The Rise of Confidential Computing\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/rJpFHADlvQA?feature=oembed&rel=0\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p><p>\t<\/div>\n\t<\/p>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/p>\n\n\n\n\n\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/lsds\/sgx-lkl\/tree\/oe_port\">OpenEnclave port of SGX-LKL<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" rel=\"noopener noreferrer\" target=\"_blank\" href=\"https:\/\/github.com\/onnx\/onnx\">ONNX Runtime<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/li>\n<\/ul>\n\n\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our goal is to make Azure the most trustworthy cloud platform for AI. The platform we envisage offers confidentiality and integrity against privileged attackers including attacks on the code, data and hardware supply chains, performance close to that offered by GPUs, and programmability of state-of-the-art ML frameworks. The confidential AI platform will enable multiple entities [&hellip;]<\/p>\n","protected":false},"featured_media":658578,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-648207","msr-project","type-msr-project","status-publish","has-post-thumbnail","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[756028,1131444,1047069,1042731,1029096,1025313,945099,939993,939924,938655,882387,879525,168426,754813,754795,696811,691908,672480,660741,592648,567648,499550,254093,168697],"related-downloads":[],"related-videos":[],"related-groups":[559983,761911,1054512],"related-events":[],"related-opportunities":[],"related-posts":[828337,916938,945684,1029624],"related-articles":[],"tab-content":[{"id":0,"name":"Videos","content":"[row][column class=\"m-col-12-24\"]\r\n\r\nAzure Responds to COVID-19 with confidential multi-party training\r\n\r\n[embed]https:\/\/youtu.be\/eM1XN1dzp9Q?t=2023[\/embed]\r\n\r\n[\/column]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\nBuilding a healthcare platform with confidential containers and confidential inference\r\n\r\n[embed]https:\/\/youtu.be\/PiYCQmOh0EI[\/embed]\r\n\r\n[\/column][\/row]\r\n[row][column class=\"m-col-12-24\"]\r\n\r\nNew developments for protecting data in use with Azure Confidential Computing\r\n\r\n[embed]https:\/\/youtu.be\/kAiH0T9Uw9g[\/embed]\r\n\r\n[\/column]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\nConfidential ML Deep Dive with Antoine\r\n\r\n[embed]https:\/\/www.youtube.com\/watch?v=4lh-0x3Jsls[\/embed]\r\n\r\n[\/column][\/row]\r\n[row][column class=\"m-col-12-24\"]\r\n\r\nConfidential Machine Learning Intro with Sylvan\r\n\r\n[embed]https:\/\/www.youtube.com\/watch?v=WfVkDKTXkO8[\/embed]\r\n\r\n[\/column]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\nSecure Multi-Party AI Showcase with Stavros\r\n\r\n[embed]https:\/\/www.youtube.com\/watch?v=o1FV56s-Qvw[\/embed]\r\n\r\n[\/column][\/row]\r\n[row][column class=\"m-col-12-24\"]\r\n\r\nAzure Confidential Computing Intro\r\n\r\n[embed]https:\/\/www.youtube.com\/watch?v=rT6zMOoLEqI[\/embed]\r\n\r\n[\/column]\r\n\r\n[column class=\"m-col-12-24\"]\r\n\r\nThe Rise of Confidential Computing with Mark Russinovich\r\n\r\n[embed]https:\/\/www.youtube.com\/watch?v=rJpFHADlvQA[\/embed]\r\n\r\n[\/column][\/row]"},{"id":1,"name":"Open Source","content":"<ul>\r\n \t<li><a href=\"https:\/\/github.com\/lsds\/sgx-lkl\/tree\/oe_port\">OpenEnclave port of SGX-LKL<\/a><\/li>\r\n \t<li><a href=\"https:\/\/github.com\/onnx\/onnx\">ONNX Runtime<\/a><\/li>\r\n<\/ul>"},{"id":2,"name":"","content":""}],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Sylvan Clebsch","user_id":36368,"people_section":"Project Team","alias":"syclebsc"},{"type":"user_nicename","display_name":"Antoine Delignat-Lavaud","user_id":31056,"people_section":"Project Team","alias":"antdl"},{"type":"user_nicename","display_name":"C\u00e9dric Fournet","user_id":31819,"people_section":"Project Team","alias":"fournet"},{"type":"user_nicename","display_name":"Boris K&ouml;pf","user_id":37857,"people_section":"Project Team","alias":"bokoepf"},{"type":"user_nicename","display_name":"Andrew Paverd","user_id":37902,"people_section":"Project Team","alias":"anpaverd"},{"type":"user_nicename","display_name":"Shruti Tople","user_id":39003,"people_section":"Project Team","alias":"shtople"},{"type":"user_nicename","display_name":"Stavros Volos","user_id":35437,"people_section":"Project Team","alias":"svolos"},{"type":"user_nicename","display_name":"Sam Webster","user_id":33775,"people_section":"Project Team","alias":"sweb"},{"type":"user_nicename","display_name":"Santiago Zanella-B\u00e9guelin","user_id":33518,"people_section":"Project Team","alias":"santiago"},{"type":"user_nicename","display_name":"Manuel Costa","user_id":32794,"people_section":"Project Collaborators","alias":"manuelc"},{"type":"user_nicename","display_name":"Stephanie Hyland","user_id":38458,"people_section":"Project Collaborators","alias":"sthyland"},{"type":"guest","display_name":"Mark Russinovich","user_id":591880,"people_section":"Project Collaborators","alias":""},{"type":"user_nicename","display_name":"Lukas Wutschitz","user_id":38775,"people_section":"Project Collaborators","alias":"luwutsch"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/648207","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":17,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/648207\/revisions"}],"predecessor-version":[{"id":919503,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/648207\/revisions\/919503"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media\/658578"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=648207"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=648207"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=648207"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=648207"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=648207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}