Research Directions for Verifiable Crypto-Physically Secure TEEs

Sylvain Bellemare
2024-10-09
Abstract:A niche corner of the Web3 world is increasingly making use of hardware-based Trusted Execution Environments (TEEs) to build decentralized infrastructure. One of the motivations to use TEEs is to go beyond the current performance limitations of cryptography-based alternatives such as zero-knowledge proofs (ZKP), fully homomorphic encryption (FHE), and multi-party computation (MPC). Despite their appealing advantages, current TEEs suffer from serious limitations as they are not secure against physical attacks, and their attestation mechanism is rooted in the chip manufacturer's trust. As a result, Web3 applications have to rely on cloud infrastruture to act as trusted guardians of hardware-based TEEs and have to accept to trust chip manufacturers. This work aims at exploring how we could potentially architect and implement chips that would be secure against physical attacks and would not require putting trust in chip manufacturers. One goal of this work is to motivate the Web3 movement to acknowledge and leverage the substantial amount of relevant hardware research that already exists. In brief, a combination of: (1) physical unclonable functions (PUFs) to secure the root-of-trust; (2) masking and redundancy techniques to secure computations; (3) open source hardware and imaging techniques to verify that a chip matches its expected design; can help move towards attesting that a given TEE can be trusted without the need to trust a cloud provider and a chip manufacturer.
Cryptography and Security,Hardware Architecture,Emerging Technologies
What problem does this paper attempt to address?
### What problems does this paper attempt to solve? This paper aims to explore how to design and implement a new type of hardware chip to build verifiable, physically - cryptographically - secure Trusted Execution Environments (TEEs), thus solving the limitations of current TEEs in Web3 applications. Specifically, the paper mainly focuses on the following aspects: 1. **Insufficient security of current TEEs**: - Current commercial TEEs cannot resist physical attacks (such as side - channel attacks and fault - injection attacks), which allows attackers to break the integrity and confidentiality of TEEs through physical access. - Existing TEEs rely on the trust of chip manufacturers, and this trust model conflicts with the decentralized goals of Web3. 2. **Trust assumption problems**: - Using current TEEs requires relying on multiple trust assumptions, including the security of chip design, the reliability of the manufacturing process, the security of root - of - trust generation, etc. These assumptions are regarded as unacceptable single - point - of - failure risks in the Web3 community. 3. **Inconsistency in decentralization requirements**: - The goal of Web3 is decentralization, while existing TEEs rely on a trusted manufacturer and cloud service provider, which goes against the concept of Web3. 4. **Threat model of physical attacks**: - The paper proposes a new adversarial model in which TEEs must be able to resist physical attacks and assumes that manufacturers and their suppliers may be malicious and may inject hardware Trojans or deviate from the expected design. To solve these problems, the paper proposes the following research directions: - **Physical Unclonable Functions (PUFs)**: Used to generate unpredictable and unique root - of - trust, ensuring that it is not known to any entity during the generation process. - **Shielding and redundancy techniques**: Used to protect the security of the computing process and prevent information leakage. - **Open - source hardware and imaging techniques**: Used to verify whether the chip conforms to the expected design, ensuring transparency and verifiability. By combining these techniques, the paper hopes to promote the Web3 community to recognize and utilize existing hardware research results, and finally realize a trust mechanism that does not need to rely on cloud service providers and chip manufacturers, so as to better support the security requirements of decentralized applications. ### Summary The core problem of this paper is to explore how to design and implement a new type of TEE that can resist attacks at the physical level and does not need to rely on the trust of any specific manufacturer or cloud service provider. This goal aims to solve the contradiction between the security and decentralization requirements of existing TEEs in Web3 applications.