
Open access
Date
2022-05-25Type
- Working Paper
ETH Bibliography
yes
Altmetrics
Abstract
The growing complexity of modern computing platforms and the need for strong isolation protections among their software components has led to the increased adoption of Trusted Execution Environments (TEEs). While several commercial and academic TEE architectures have emerged in recent times, they remain hard to compare and contrast. More generally, existing TEEs have not been subject to a holistic systematization to understand the available design alternatives for various aspects of TEE design and their corresponding pros-and-cons. Therefore, in this work, we analyze the design of existing TEEs and systematize the mechanisms that TEEs implement to achieve their security goals, namely, verifiable launch, run-time isolation, trusted IO, and secure storage. More specifically, we analyze the typical architectural building blocks underlying TEE solutions, design alternatives for each of these components and the trade-offs that they entail. We focus on hardware-assisted TEEs and cover a wide range of TEE proposals from academia and the industry. Our analysis shows that although TEEs are diverse in terms of their goals, usage models, and instruction set architectures, they all share many common building blocks in terms of their design. Show more
Permanent link
https://doi.org/10.3929/ethz-b-000722075Publication status
publishedExternal links
Journal / series
arXivPublisher
Cornell UniversityEdition / version
v1Subject
Cryptography and Security (cs.CR); Hardware Architecture (cs.AR); FOS: Computer and information sciencesOrganisational unit
03755 - Capkun, Srdan / Capkun, Srdan
More
Show all metadata
ETH Bibliography
yes
Altmetrics