Characterizing Trust Boundary Vulnerabilities in TEE Containers

📅 2025-08-28
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
TEE containers face systemic security risks—including information leakage, rollback attacks, denial-of-service (DoS), and Iago attacks—due to ambiguously defined trust boundaries and isolation failures. This paper introduces the first automated boundary identification framework that jointly leverages static and dynamic analysis to reverse-engineer and formally verify isolation policies of mainstream TEE containers (e.g., SCONE, Gramine). Our analysis uncovers critical trust boundary misalignments in multiple production-deployed containers, empirically reproduces four classes of high-severity attacks, and quantifies their exploitability and impact scope. The work establishes a reusable trust boundary modeling paradigm and provides concrete hardening guidelines for TEE middleware design. By enabling rigorous, artifact-based boundary validation, it advances trusted execution environments from opaque “black-box” encapsulation toward verifiable, architecture-aware isolation.

Technology Category

Application Category

📝 Abstract
Trusted Execution Environments (TEEs) have emerged as a cornerstone of confidential computing, garnering significant attention from both academia and industry. To enable the secure development, execution, and deployment, of applications on TEE platforms, TEE containers have been introduced as middleware solutions. These containers aim to shield applications from potentially malicious operating systems and orchestration interfaces while maintaining usability and reliability. In this paper, we analyze the isolation strategies employed by existing TEE containers to protect secure applications. To address the challenges in analyzing these interfaces, we designed an automated analyzer to precisely identify and evaluate their isolation boundaries. We observed that some TEE containers fail to achieve their intended goals due to critical design and implementation flaws, such as information leakage, rollback attacks, denial-of-service, and Iago attacks, which pose significant security risks. Drawing from our findings, we share key lessons to guide the development of more secure container solutions and discuss emerging trends in TEE containerization design.
Problem

Research questions and friction points this paper is trying to address.

Analyzing isolation strategies in TEE containers
Identifying design flaws causing security vulnerabilities
Evaluating trust boundary protection mechanisms
Innovation

Methods, ideas, or system contributions that make the work stand out.

Automated analyzer for TEE container isolation boundaries
Identified design flaws causing security vulnerabilities
Lessons for developing secure container solutions
🔎 Similar Papers
No similar papers found.
Weijie Liu
Weijie Liu
Nankai University
System SecurityVirtualizationBinary AnalysisImage Fusion
H
Hongbo Chen
Indiana University Bloomington
Shuo Huai
Shuo Huai
Nanyang Technological University
Edge ComputingModel OptimizationIn-Memory Computing
Z
Zhen Xu
Huazhong University of Science and Technology
W
Wenhao Wang
Institute of Information Engineering, CAS
Z
Zhi Li
Huazhong University of Science and Technology
Z
Zheli Liu
Nankai University