No code change approach to confidential computing