SoK: A Systematic Review of TEE Usage for Developing Trusted Applications

06/26/2023
by   Arttu Paju, et al.
0

Trusted Execution Environments (TEEs) are a feature of modern central processing units (CPUs) that aim to provide a high assurance, isolated environment in which to run workloads that demand both confidentiality and integrity. Hardware and software components in the CPU isolate workloads, commonly referred to as Trusted Applications (TAs), from the main operating system (OS). This article aims to analyse the TEE ecosystem, determine its usability, and suggest improvements where necessary to make adoption easier. To better understand TEE usage, we gathered academic and practical examples from a total of 223 references. We summarise the literature and provide a publication timeline, along with insights into the evolution of TEE research and deployment. We categorise TAs into major groups and analyse the tools available to developers. Lastly, we evaluate trusted container projects, test performance, and identify the requirements for migrating applications inside them.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/18/2022

Confidential Machine Learning within Graphcore IPUs

We present IPU Trusted Extensions (ITX), a set of experimental hardware ...
research
04/12/2023

CoVE: Towards Confidential Computing on RISC-V Platforms

Multi-tenant computing platforms are typically comprised of several soft...
research
01/05/2021

A practical approach for updating an integrity-enforced operating system

Trusted computing defines how to securely measure, store, and verify the...
research
04/25/2019

Developing Secure Services for IoT with OP-TEE: A First Look at Performance and Usability

The implementation, deployment and testing of secure services for Intern...
research
05/25/2022

SoK: Hardware-supported Trusted Execution Environments

The growing complexity of modern computing platforms and the need for st...
research
01/16/2021

T-Lease: A Trusted Lease Primitive for Distributed Systems

A lease is an important primitive for building distributed protocols, an...
research
08/12/2023

Making Your Program Oblivious: a Comparative Study for Side-channel-safe Confidential Computing

Trusted Execution Environments (TEEs) are gradually adopted by major clo...

Please sign up or login with your details

Forgot password? Click here to reset