Closed sid-agrawal closed 3 months ago
This paper talks about how to implment TEE without TEE HW, the TLDR is that stuff is encrypted on Context switch.
Look at the following paper that came up during TII’s presentation at the 2023 seL4 summit
To model TEE on OSmosis:
We need to ascertain that the OSmosis model can capture the isolation guarantees provided by a Trusted Execution Environment (TEE). In its most basic form, a TEE is supposed to provide confidentiality and integrity for the code and data running inside the TEE from the OS. We will examine Intel SGX (Software Guard Extensions) and ARM’s Trust Zones. Both implementations of the TEE concept are sufficiently different, and modeling just these two should suffice in determining if OSmosis can adequately model TEE. In SGX, the process data is confidential from the OS. An entirely isolated OS instance in the TZ is confidential from the primary OS.
The following should be clear from the model depiction: • That the OS cannot access the data pages of the application • A lower-level software (e.g., firmware in ARM) is still trusted.
This issue relates to the conversation about whether data is interpreted discussed in #41