Abstraction of Trusted Execution Environments as the Missing Layer for Broad Confidential Computing Adoption: A Systematization of Knowledge
By: Quentin Michaud , Sara Ramezanian , Dhouha Ayed and more
Potential Business Impact:
Makes computers keep secrets safe from hackers.
Trusted Execution Environments (TEEs) protect sensitive code and data from the operating system, hypervisor, or other untrusted software. Different solutions exist, each proposing different features. Abstraction layers aim to unify the ecosystem, allowing application developers and system administrators to leverage confidential computing as broadly and efficiently as possible. We start with an overview of representative available TEE technologies. We describe and summarize each TEE ecosystem, classifying them in different categories depending on their main design choices. Then, we propose a systematization of knowledge focusing on different abstraction layers around each design choice. We describe the underlying technologies of each design, as well as the inner workings and features of each abstraction layer. Our study reveals opportunities for improving existing abstraction layer solutions. It also highlights WebAssembly, a promising approach that supports the largest set of features. We close with a discussion on future directions for research, such as how future abstraction layers may evolve and integrate with the confidential computing ecosystem.
Similar Papers
Confidential Computing for Cloud Security: Exploring Hardware based Encryption Using Trusted Execution Environments
Cryptography and Security
Keeps your private computer information safe.
What You Trust Is Insecure: Demystifying How Developers (Mis)Use Trusted Execution Environments in Practice
Software Engineering
Makes computer code safer from hackers.
Characterizing Trust Boundary Vulnerabilities in TEE Containers
Cryptography and Security
Finds security holes in secret computer programs.