SoK: Trusted Execution in SoC-FPGAs

📅 2025-03-20
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
In edge computing, FPGA-based devices—lacking robust native security mechanisms—are increasingly targeted by attackers, while existing Trusted Execution Environment (TEE) solutions are often scenario-specific, lacking functional completeness, scalability, and cross-platform compatibility. This paper presents the first systematic mapping study (SoK) on FPGA-based TEEs, analyzing 27 representative works to construct a multidimensional feature model and conduct cross-scheme comparison and security evaluation. We identify three critical gaps: (1) absence of a unified, scalable architecture; (2) incomplete functional coverage; and (3) severe shortage of empirical validation and open-source implementations. Based on these findings, we propose a rich-feature, modular, and extensible TEE design paradigm and evolutionary roadmap tailored for general-purpose SoC-FPGA platforms. Our work establishes both theoretical foundations and practical guidelines for hardware-enhanced trustworthy edge computing.

Technology Category

Application Category

📝 Abstract
Trusted Execution Environments (TEEs) have emerged at the forefront of edge computing to combat the lack of trust between system components. Field Programmable Gate Arrays (FPGAs) are commonly used as edge computers but were not created with security as a primary consideration. Thus, FPGA-based edge computers are increasingly the target of cyberattacks. We analyze the existing literature to systematize the applications and features of FPGA-based TEEs. We identified 27 primary studies related to different types of System-on-Chip FPGA-based TEEs. Across a wide range of applications and features, the availability of extensible solutions is limited. Most solutions focus on specific features and applications, whereas few solutions focus on feature-rich, comprehensive TEEs that can be utilized across computer systems. Whether TEEs are specific or extensible, the paucity of published studies provides evidence of research gaps. This SoK delineates these gaps revealing opportunities for researchers and developers.
Problem

Research questions and friction points this paper is trying to address.

Analyzing FPGA-based TEEs for edge computing security
Identifying gaps in extensible FPGA-TEE solutions
Systematizing applications of System-on-Chip FPGA TEEs
Innovation

Methods, ideas, or system contributions that make the work stand out.

FPGA-based Trusted Execution Environments for edge computing
Systematizing applications of SoC-FPGA TEEs
Identifying gaps in extensible TEE solutions
🔎 Similar Papers
No similar papers found.
G
Garrett Perkins
Montana State University, Bozeman, MT, USA
B
Benjamin Macht
Montana State University, Bozeman, MT, USA
L
Lucas Ritzdorf
Montana State University, Bozeman, MT, USA
T
T. Crane
Montana State University, Bozeman, MT, USA
B
B. Lameres
Montana State University, Bozeman, MT, USA
Clemente Izurieta
Clemente Izurieta
Professor of Computer Science, Software Engineering and Cybersecurity Lab, Montana State University
software engineeringdesign patternstechnical debtempirical methodscybersecurity
A
Ann Marie Reinhold
Pacific Northwest National Laboratory, Richland, WA, USA