Show simple item record

dc.contributor.authorLi, Mengyuan
dc.contributor.authorYang, Yuheng
dc.contributor.authorChen, Guoxing
dc.contributor.authorYan, Mengjia
dc.contributor.authorZhang, Yinqian
dc.date.accessioned2024-07-08T18:12:51Z
dc.date.available2024-07-08T18:12:51Z
dc.date.issued2024-07
dc.identifier.isbn979-8-4007-0482-6
dc.identifier.urihttps://hdl.handle.net/1721.1/155456
dc.description.abstractTrusted execution environment (TEE) is a revolutionary technology that enables secure remote execution (SRE) of cloud workloads on untrusted server-side computing platforms. Both commercial and academic TEEs have been proposed in the past few years, including Intel's SGX and TDX, AMD's SEV, ARM's CCA, IBM's PEF, and their academic counterparts built atop open-source RISC-V processors, such as Keystone, Sanctum, CURE, and Penglai. While great efforts from both sides have been made in developing a confidential computing ecosystem, the existence of server-side TEEs with drastically different designs and the presence of various known attacks have significantly increased the difficulty of understanding TEE designs and the reasons behind existing attacks. This paper offers a structured analysis of the design choices of server-side TEEs, focusing on dissecting TEE designs and identifying their potential pitfalls. We introduce the TEE Runtime Architectural Framework (TRAF), a detailed framework that facilitates a thorough and methodical dissection of TEE designs by analyzing the high-level considerations made by TEE designs. A key aspect of TRAF's analysis is the reconfiguration of resource management in TEE designs, where the host OS used to have full control. By incorporating the Trusted Computing Base (TCB), TEE designs adopt different design choices on how to divide and coordinate tasks between the host OS and TCB to achieve security and effective management of computational resources. TRAF specifically investigates how common resources, such as CPU, memory, and I/O devices, are managed jointly by the TCB and host OS. This includes a focused study of factors that influence design choices, such as TCB size, performance, and efficiency. Furthermore, by examining existing vulnerabilities and attacks on TEEs, the paper further evaluates the security impact of varied design choices.en_US
dc.publisherACMen_US
dc.relation.isversionof10.1145/3634737.3644993en_US
dc.rightsCreative Commons Attribution-Noncommercialen_US
dc.rights.urihttps://creativecommons.org/licenses/by-nc/4.0/en_US
dc.sourceAssociation for Computing Machineryen_US
dc.titleSoK: Understanding Design Choices and Pitfalls of Trusted Execution Environmentsen_US
dc.typeArticleen_US
dc.identifier.citationLi, Mengyuan, Yang, Yuheng, Chen, Guoxing, Yan, Mengjia and Zhang, Yinqian. 2024. "SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments."
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.identifier.mitlicensePUBLISHER_CC
dc.eprint.versionFinal published versionen_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2024-07-01T07:57:12Z
dc.language.rfc3066en
dc.rights.holderThe author(s)
dspace.date.submission2024-07-01T07:57:12Z
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record