Learn
0%
Workshop
0%

Confidential Computing & TEEs

TEE architectures, remote attestation, memory encryption, TEE-HSM integration, and quantum threat analysis for confidential computing.

A is a hardware-isolated region of a processor that guarantees confidentiality and integrity of code and data loaded inside it. Unlike traditional OS-level isolation, TEEs protect workloads even when the operating system, hypervisor, or firmware has been fully compromised.

Code running inside a TEE operates within an — a protected memory region where the processor enforces access control in hardware. Data inside the enclave is encrypted in DRAM, decrypted only within the CPU cache, and inaccessible to any software outside the enclave boundary.

TEEs Protect Against

  • • Compromised operating system or hypervisor
  • • Malicious cloud administrator or co-tenant
  • • Cold boot attacks and DRAM bus snooping
  • • DMA attacks from peripheral devices
  • • Software-level privilege escalation

TEEs Do NOT Protect Against

  • • Microarchitectural side channels (Spectre, Meltdown)
  • • Supply chain attacks on CPU manufacturing
  • • Bugs within the enclave code itself
  • • Denial-of-service (host can starve enclave)
  • • Physical decapping and FIB probing

Trusted Computing Base (TCB)

The TCB is the set of all hardware, firmware, and software components that must function correctly for the security guarantees to hold. A smaller TCB means fewer components can undermine security. Process-level TEEs (SGX) have the smallest TCB — just the CPU and enclave code. VM-level TEEs (TDX, SEV-SNP) include the guest OS, resulting in a larger but more practical TCB.

Data Protection Comparison

Data at Rest

Encrypted on disk via AES-XTS or similar. Protected by volume encryption (LUKS, BitLocker) or database-level TDE.

WELL-ESTABLISHED
Data in Transit

Encrypted over the network via TLS 1.3, IPsec, or WireGuard. Protects against eavesdropping and tampering during transmission.

WELL-ESTABLISHED
Data in Use

Encrypted in memory while being processed. TEEs provide hardware-enforced isolation so data remains protected during computation.

EMERGING (TEE-DEPENDENT)

Ready to explore TEE architectures?

Compare vendor security properties, simulate attestation flows, and assess PQC migration readiness in the interactive workshop.

Check off all sections and mark this reading done.

Learning module content can be inaccurate. Please double-check its information. Report inaccuracies in PQC Today GitHub Discussions.