5
0

Narrowing the Gap between TEEs Threat Model and Deployment Strategies

Filip Rezabek
Jonathan Passerat-Palmbach
Moe Mahhouk
Frieder Erdmann
Andrew Miller
Main:2 Pages
1 Figures
Bibliography:1 Pages
Abstract

Confidential Virtual Machines (CVMs) provide isolation guarantees for data in use, but their threat model does not include physical level protection and side-channel attacks. Therefore, current deployments rely on trusted cloud providers to host the CVMs' underlying infrastructure. However, TEE attestations do not provide information about the operator hosting a CVM. Without knowing whether a Trusted Execution Environment (TEE) runs within a provider's infrastructure, a user cannot accurately assess the risks of physical attacks. We observe a misalignment in the threat model where the workloads are protected against other tenants but do not offer end-to-end security assurances to external users without relying on cloud providers. The attestation should be extended to bind the CVM with the provider. A possible solution can rely on the Protected Platform Identifier (PPID), a unique CPU identifier. However, the implementation details of various TEE manufacturers, attestation flows, and providers vary. This makes verification of attestations, ease of migration, and building applications without relying on a trusted party challenging, highlighting a key limitation that must be addressed for the adoption of CVMs. We discuss two points focusing on hardening and extensions of TEEs' attestation.

View on arXiv
@article{rezabek2025_2506.14964,
  title={ Narrowing the Gap between TEEs Threat Model and Deployment Strategies },
  author={ Filip Rezabek and Jonathan Passerat-Palmbach and Moe Mahhouk and Frieder Erdmann and Andrew Miller },
  journal={arXiv preprint arXiv:2506.14964},
  year={ 2025 }
}
Comments on this paper