Score: 2

Abstraction of Trusted Execution Environments as the Missing Layer for Broad Confidential Computing Adoption: A Systematization of Knowledge

Published: December 26, 2025 | arXiv ID: 2512.22090v1

By: Quentin Michaud , Sara Ramezanian , Dhouha Ayed and more

BigTech Affiliations: Thales

Potential Business Impact:

Makes computers keep secrets safe from hackers.

Business Areas:
Cloud Security Information Technology, Privacy and Security

Trusted Execution Environments (TEEs) protect sensitive code and data from the operating system, hypervisor, or other untrusted software. Different solutions exist, each proposing different features. Abstraction layers aim to unify the ecosystem, allowing application developers and system administrators to leverage confidential computing as broadly and efficiently as possible. We start with an overview of representative available TEE technologies. We describe and summarize each TEE ecosystem, classifying them in different categories depending on their main design choices. Then, we propose a systematization of knowledge focusing on different abstraction layers around each design choice. We describe the underlying technologies of each design, as well as the inner workings and features of each abstraction layer. Our study reveals opportunities for improving existing abstraction layer solutions. It also highlights WebAssembly, a promising approach that supports the largest set of features. We close with a discussion on future directions for research, such as how future abstraction layers may evolve and integrate with the confidential computing ecosystem.

Country of Origin
πŸ‡«πŸ‡· πŸ‡ΈπŸ‡ͺ France, Sweden

Page Count
35 pages

Category
Computer Science:
Cryptography and Security