Beyond Theory: Investigating the Practical Feasibility of Confidential Computing | IEEE Conference Publication | IEEE Xplore