Trusted Execution Environment: State-of-the-Art and Future Directions

被引:0
|
作者
Zhang F. [1 ]
Zhou L. [1 ]
Zhang Y. [1 ]
Ren M. [1 ]
Deng Y. [1 ]
机构
[1] Research Institute of Trustworthy Autonomous Systems, Southern University of Science and Technology, Shenzhen, Guangdong 518055)(Department of Computer Science and Engineering, Southern University of Science and Technology, Shenzhen, Guangdong 518055
基金
中国国家自然科学基金;
关键词
memory isolation; OS architecture; processor mode; security attestation; trusted execution environment (TEE);
D O I
10.7544/issn1000-1239.202221016
中图分类号
学科分类号
摘要
Trusted execution environment (TEE) technologies are widely developed in the current computer systems along with the user’s serious concerns about privacy protection, secure computing, etc. in network services. Generally, TEEs provide an isolated execution environment for the managers and users for privacy and confidential computing even if the underlying operating systems are compromised. To build the TEEs, the device manufacturers like Intel, Arm update the hardware foundation by adding the external processor mode, memory control, cryptography engine, etc. In addition, they provide corresponding interfaces in the system following the application requirements. Except that, researchers further design compatible TEE models for various goals with the above hardware or firmware assistance. We comprehensively analyze the technical characteristics of TEE technology in mainstream system architecture (including x86, Arm, RISC-V, heterogeneous computing unit), including infrastructure and hardware facilities design, software interface definition, security boundary, etc., and explore the feasible application scenarios of TEE technology. At the same time, we analyze the challenges of current TEE technologies and discuss the limitations and the security risks, e.g., side-channel attacks. Finally, we summarize the advantages and disadvantages of various TEE technologies from the aspects of security and functionality, and consider the future development of TEE. © 2024 Science Press. All rights reserved.
引用
收藏
页码:243 / 260
页数:17
相关论文
共 121 条
  • [1] Dai Weiqi, Jin Hai, Zou Deqing, Et al., TEE: A virtual DRTM based execution environment for secure cloud-end computing[C], Proc of the 17th ACM Conf on Computer and Communications Security, pp. 663-665, (2010)
  • [2] Bryan P., Bootstrapping trust in a trusted platform, Proc of the 3rd Conf on Hot Topics in Security, (2008)
  • [3] Cramer R, Damgard I B., Secure Multiparty Computation and Secret Sharing, (2015)
  • [4] Xu Yi, Paulet R, Bertino E, Et al., Homomorphic Encryption and Applications, (2014)
  • [5] Zhiwei Wang, Rui Hou, Peinan Li, Et al., HE-Booster: An efficient polynomial arithmetic acceleration on GPUs for fully homomorphic encryption[J], IEEE Transactions on Parallel and Distributed Systems, 34, 4, pp. 1067-1081, (2023)
  • [6] Wojtczuk R, Joanna R., Attacking SMM memory via Intel CPU cache poisoning [EB/OL], (2009)
  • [7] Futral W, Greene J., Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters, (2013)
  • [8] Skochinsky I., Intel ME secrets
  • [9] Android enterprise security, (2020)
  • [10] Costan V, Devadas S., Intel SGX explained, IACR Cryptology ePrint Archive