A New Category of Secure Compute: Verifiable, Deterministic, and Private Execution for Any Linux Workload
Assured Execution Environments (AEEs) are a new category of secure compute that fundamentally changes how we think about verifiable execution.
Unlike Trusted Execution Environments (TEEs) and Hardware Security Modules (HSMs), which rely on proprietary hardware trust chains and vendor attestations, AEEs deliver verifiable execution through keyless cryptographic receipts. The receipt provides a cryptographic guarantee that the environment behaved exactly as declared. This includes the Linux kernel, the distribution, and the user workloads.
AEEs enable organizations to run unmodified Linux applications in a fully deterministic and private execution environment, then produce portable receipts that can be verified anywhere—from mobile devices to browsers—without revealing sensitive code or data.
Rely on proprietary hardware trust chains and vendor attestations. You must trust the hardware manufacturer and the vendor's attestation service.
Replace vendor trust with cryptographic assurance—verifiable anywhere, anytime, by anyone. No proprietary hardware or vendor attestation services required.
Execution behaves identically for all observers, enabling reproducibility and auditability. The same inputs always produce the same outputs, making execution predictable and verifiable.
The environment produces cryptographic receipts that attest to its behavior. These receipts are portable and can be verified on any device, anywhere, without specialized hardware.
Developers control what, if anything, is disclosed in the receipt. Guarantee execution correctness without revealing sensitive code, data, or operational details.
Run your existing Linux applications without modification. No custom SDKs, no code rewrites, no special APIs to learn. Just run your workload in an AEE.
Unlike TEEs and HSMs, AEEs don't require proprietary hardware. Run on any standard Linux infrastructure and verify receipts on any device.
Receipts can be verified anywhere—servers, mobile devices, browsers. No need for specialized verification infrastructure or vendor-specific tools.
AEE receipts provide keyless, transparent cryptographic assurance. No vendor trust; just open-source, audited cryptography.
Control what information is disclosed. Guarantee execution correctness without revealing proprietary source code, data, or operational secrets.
Execution is fully deterministic, enabling reproducible results. The same inputs always produce the same outputs, making verification straightforward.
Execute your unmodified Linux application inside an Assured Execution Environment. The AEE captures the complete execution state.
The AEE produces a cryptographic receipt that guarantees the execution behavior with cryptographic assurance, including the environment, inputs, and outputs.
Share the receipt along with your results. The receipt is small, portable, and contains everything needed for verification.
Anyone can verify the receipt on any device to confirm the execution behaved exactly as declared, without revealing sensitive details.
AEEs are compatible with unmodified Linux workloads and require no custom SDKs or hardware dependencies. Early use cases include:
Learn how AEEs can transform your secure compute infrastructure.
Contact Us