// Confidential AI Infrastructure

Unlock collaborative AI with hardware-level privacy.

The open-source foundation for confidential computing. Train and run AI models on sensitive data inside secure enclaves — with end-to-end attestation and zero trust in the host.

// Architecture
v0.9.0 · APACHE-2.0
cocos · session
$ cocos attest verify
·fetching measurement...
TEE: AMD SEV-SNP
image hash: 0x9f4a...e8b1
chain of trust: verified
launching workload...
// Trust Boundary
DATA
──›
AGENT
HAL
──›
TEE
amd-sev-snp·intel-tdx·verified
attested · runningtee_id: 0xa12c

// How It Works

Secure multi-party computation, by construction

01

Secure Enclaves

Data and code are isolated in hardware-encrypted Trusted Execution Environments — AMD SEV-SNP, Intel TDX.

// AMD-SEV · INTEL-TDX

02

Remote Attestation

Cryptographic proofs verify the workload is running on genuine hardware and the expected, untampered binary.

// VTPM · SEV-SNP · TDX

03

Confidential Compute

Compute over encrypted data without exposing it to the cloud provider, hypervisor, or infrastructure operator.

// IN-USE ENCRYPTION

// Trusted Partners

Collaborating with leading organizations

in confidential computing and secure AI.

European Commission
European Commission
Telefónica
Telefónica
VTT
VTT
Fujitsu
Fujitsu
Fraunhofer
Fraunhofer
TNO
TNO
Ericsson
Ericsson
Nokia
Nokia
Inserm
Inserm
TU Eindhoven
TU Eindhoven
Thales
Thales
Imdea
Imdea
IF
IF
ETF
ETF
European Commission
European Commission
Telefónica
Telefónica
VTT
VTT
Fujitsu
Fujitsu
Fraunhofer
Fraunhofer
TNO
TNO
Ericsson
Ericsson
Nokia
Nokia
Inserm
Inserm
TU Eindhoven
TU Eindhoven
Thales
Thales
Imdea
Imdea
IF
IF
ETF
ETF

// Memberships

Members of key industry consortia

Linux Foundation
Linux Foundation
Confidential Computing Consortium
Confidential Computing Consortium

// Why Cocos

For decades, AI on sensitive data forced a compromise

Either you trust the cloud — or you build everything from scratch. Cocos AI removes that tradeoff.

// Status Quo

Traditional Cloud AI

Speed and integration, but at a cost

  • Plaintext data exposed to the cloud provider
  • Implicit trust in the hypervisor and host OS
  • No cryptographic proof of execution integrity
  • Compliance burden falls on the data owner
Cocos AI

// The New Default

Confidential by design

Hardware-rooted trust, no compromises

  • Hardware-isolated TEEs (AMD SEV-SNP, Intel TDX)
  • Cryptographic remote attestation, end-to-end
  • Encrypted in-use data — invisible to the host
  • Open-source. Apache 2.0. Self-hostable.

// About

Built in research, hardened in production

Cocos AI started with the support of the School of Electrical Engineering (ETF), University of Belgrade, and the Serbian government's Innovation Fund. It has since evolved through several major European Union research initiatives, including CONFIDENTIAL6G, TITAN, and ELASTIC.

// Lead Developer

Ultraviolet

Ultraviolet

A specialized technology company with a strong reputation in the security domain. Ultraviolet coordinates the project, builds the user experience, and manages the SaaS offering — leading the development and commercialization of the Cocos AI platform.

Visit Ultraviolet

// Funded By

Initiated with support from the School of Electrical Engineering (ETF), University of Belgrade, and funded by the Innovation Fund from the Republic of Serbia (Project ID 50314). Further developed through EU-funded projects: CONFIDENTIAL6G, TITAN, and ELASTIC.

Innovation Fund
Republic of Serbia
European Union

// Use Cases

Real-world workloads, hardware-isolated

Where data sensitivity meets compute demand — Cocos AI keeps both sides honest.

01 · Medical / Pharma

Medical / Pharma

  • Encrypted patient data exchange for medical trials and drug discovery
  • Drug distribution, serialization, and tracking
02 · Public / Government

Public / Government

  • Cross-agency analytics and AI/ML over confidential citizen data
03 · Banking / Finance

Banking / Finance

  • Private payment data exchange for fraud detection and AML
  • Secure credit approval workflows
  • Trustless transaction handling between parties
04 · Transportation / Logistics

Transportation / Logistics

  • Autonomous driving routing and AI/ML
  • Logistics data analytics across operators
05 · Industry

Industry

  • Multi-party computation across competing companies
  • Predictive maintenance via shared models
  • Quality assurance and Industry 4.0 data exchange
06 · Software Development

Software Development

  • IP protection — algorithms shielded from cloud providers
  • Mitigation of insider threats inside organizations

// Capabilities

One platform. Every confidential workload.

> SECURE_VM_PROVISIONING

Deploy and maintain confidential virtual machines.

> HARDWARE_ABSTRACTION

Unified interface for AMD SEV and Intel TDX.

> IN_ENCLAVE_AGENT

Execution scheduler and coordinator within the enclave.

> END_TO_END_ENCRYPTION

Encrypted traffic, data, and execution state.

> REMOTE_ATTESTATION

Verify integrity and establish trust over the wire.

> MULTIPLE_RUNTIMES

Python, Docker, and WebAssembly workloads.

> SDK_AND_CLI

First-class developer tooling for secure pipelines.

> HIGH_PERFORMANCE

Small footprint, near-bare-metal execution.

> OPEN_SOURCE

Apache 2.0 — auditable, forkable, accountable.

// System Architecture

Robust by design, scalable by default

cocos · system_architecture
01Cloud
Computation Management
orchestrator
gRPC
04Client PC
User CLI
cocos cli
Attestation (gRPC)
Algo + data (gRPC · aTLS)
02TEE Serversamd sev-snp · intel tdx
Manager
TEE provisioning & configuration
Qemu launch · 9P
TEE
9P channel
// In-enclave Agent03 · EOS
  • Agent
  • Config files / TLS certs
  • HAL + Runtime
  • TEE Enclave CPU HW (SEV / TDX)
attested manager clientapache-2.0

// Get Started

Run sensitive AI workloads — without trusting the host.

Self-host the open-source stack today, or talk to the team about deployments.

// Contact

Talk to the team

Reach out for partnerships, deployments, or research collaboration.

// Headquarters

Ultraviolet
Ultraviolet d.o.o.
Bulevar Arsenija Čarnojevića 103/4
11000 Belgrade, Serbia
info@ultraviolet.rs