|国家预印本平台
首页|Narrowing the Gap between TEEs Threat Model and Deployment Strategies

Narrowing the Gap between TEEs Threat Model and Deployment Strategies

Narrowing the Gap between TEEs Threat Model and Deployment Strategies

来源:Arxiv_logoArxiv
英文摘要

Confidential Virtual Machines (CVMs) provide isolation guarantees for data in use, but their threat model does not include physical level protection and side-channel attacks. Therefore, current deployments rely on trusted cloud providers to host the CVMs' underlying infrastructure. However, TEE attestations do not provide information about the operator hosting a CVM. Without knowing whether a Trusted Execution Environment (TEE) runs within a provider's infrastructure, a user cannot accurately assess the risks of physical attacks. We observe a misalignment in the threat model where the workloads are protected against other tenants but do not offer end-to-end security assurances to external users without relying on cloud providers. The attestation should be extended to bind the CVM with the provider. A possible solution can rely on the Protected Platform Identifier (PPID), a unique CPU identifier. However, the implementation details of various TEE manufacturers, attestation flows, and providers vary. This makes verification of attestations, ease of migration, and building applications without relying on a trusted party challenging, highlighting a key limitation that must be addressed for the adoption of CVMs. We discuss two points focusing on hardening and extensions of TEEs' attestation.

Filip Rezabek、Jonathan Passerat-Palmbach、Moe Mahhouk、Frieder Erdmann、Andrew Miller

计算技术、计算机技术

Filip Rezabek,Jonathan Passerat-Palmbach,Moe Mahhouk,Frieder Erdmann,Andrew Miller.Narrowing the Gap between TEEs Threat Model and Deployment Strategies[EB/OL].(2025-06-17)[2025-06-28].https://arxiv.org/abs/2506.14964.点此复制

评论