Confidential Computing, Encrypted Virtualization, Execution-Only Memory, Intra-process isolation, Syscall Filtering, Trusted Execution Environment.