Submitted:
01 October 2025
Posted:
02 October 2025
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Background
2.1. Trusted Execution Environments and Secure Enclaves
2.2. RISC-V Security Landscape
3. Survey of RISC-V TEEs and Enclave Architectures
3.1. Keystone
3.2. Sanctum
3.3. TIMBER-V
3.4. MI6
3.5. HECTOR-V
3.6. CURE
3.7. CoVE
3.8. WorldGuard
3.9. SPEAR-V
3.10. VirTEE
3.11. DORAMI
3.12. Elasticlave
3.13. Cerberus
3.14. AP-TEE
3.15. Penglai
3.16. AnyTEE
| System | Enclave Type | Priv. | Memory Isolation | Sec. I/O | Cache | SDK | TCB Size | Compliance | No HW Mod. | Crypto. |
|---|---|---|---|---|---|---|---|---|---|---|
| Keystone[25] | Custom Runtime | U+S | PMP | ○ | ◍ | Partial | ∼8.4k LoC | ○ | ● | ○ |
| Sanctum[26] | User Enclave | U | PMP + PTW mods | ○ | ● | None | ∼5k LoC | ○ | ◍ | ○ |
| TIMBER-V[27] | Sub-process | U | Tagged memory | ○ | ◍ | None | ∼? | ○ | ● | ○ |
| CURE[30] | Multi-level (U/S/M) | U/S/M | Cache-tagging | ● | ● | None | Partial SM | ○ | ○ | ○ |
| Cerberus[31] | Custom PMP-based | U+S | PMP | ○ | ◍ | None | ∼? | ○ | ● | ○ |
| CoVE[32] | TVM-based Enclave | S | MTT + G-stage | ● | ● | Partial | ∼? | ◍ | ○ | ○ |
| Dorami[36] | Firmware-focused | U | PMP | ○ | ○ | None | n/a | ○ | ● | ○ |
| Elasticlave[37] | Temporal Enclave | U | PMP + Shared Pages | ○ | ○ | None | ∼8.5k LoC | ○ | ● | ○ |
| Hector-V[29] | Core-partitioned | Core | Interconnect Filtering | ● | ● | None | HW SM | ○ | ○ | ◍ |
| MI6[28] | Unknown | ? | Unknown | ○ | ○ | None | Unknown | ○ | ◍ | ◍ |
| SPEAR-V[34] | S-mode Enclave | S | PMP | ○ | ○ | None | Unknown | ○ | ● | ○ |
| WorldGuard[33] | Domain-based | Core | Bus Filtering | ● | ● | None | SoC-based | ○ | ○ | ○ |
| Penglai[39] | User Enclave | U | MMU-based | ○ | ◍ | None | ∼10.2k LoC | ○ | ○ | ○ |
| AnyTEE[40] | sdTZ, sdSGX | U+S | Page Tables + VMM | ◍ | ◍ | None | ∼9.4k LoC | ○ | ● | ○ |
4. Discussion
4.1. Design Trade-offs
4.2. Scalability and Serverless Use Cases
4.3. Secure I/O
4.4. Defenses Against Side-channel Attacks
4.5. Systemic Challenges
4.6. Toward a Cohesive Ecosystem
4.7. SDK and Developer Support
4.8. Compliance and Standardization
4.9. Trusted Computing Base (TCB) Size
4.10. Hardware Modifications and Deployability
4.11. Cryptographic Support
4.12. Grouping by Enclave Type and Memory Isolation
4.13. Cross-Cutting Observations
4.14. Future Directions for RISC-V Trusted Execution Environments
5. Conclusions
Short Biography of Authors
Author Contributions
Funding
Conflicts of Interest
References
- Sabt, M.; Achemlal, M.; Bouabdallah, A. Trusted Execution Environment: What It Is, and What It Is Not. In Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Helsinki, Finland, 20–22 August 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 57–64. [Google Scholar] [CrossRef]
- Costan, V.; Devadas, S. Intel SGX Explained. In Proceedings of the USENIX Security Symposium, Austin, TX, USA, 10–12 August 2016; USENIX Association: Berkeley, CA, USA, 2016; pp. 175–190. [Google Scholar]
- Kaplan, D.; Powell, J.; Woller, T. AMD Memory Encryption. AMD White Paper, 2016. Available online: https://www.amd.com/system/files/TechDocs/55766_SEV-KM_API_Spec.pdf (accessed on 30 September 2025).
- ARM Ltd. ARM Security Technology—Building a Secure System Using TrustZone Technology. ARM Technical Report, 2009. Available online: https://developer.arm.com/documentation/PRD29-GENC-009492C?lang=en (accessed on 30 September 2025).
- Oliner, A.; Weisse, O.; Austin, T. Analyzing the Limits of Intel SGX for Secure Cloud Computation. In Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS), Madison, WI, USA, 24–26 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 233–244. [Google Scholar] [CrossRef]
- Hetzelt, F.; Buhren, R. SEVered: Subverting AMD’s Virtual Machine Encryption. In Proceedings of the 11th European Workshop on Systems Security (EuroSec), Porto, Portugal, 23 April 2018; ACM: New York, NY, USA, 2018; pp. 1–6. [Google Scholar]
- Raj, H.; Natu, M.; Sarma, S.; Chandra, V. TEE Support in Arm Processors: A Survey. IEEE Design & Test 2020, 37, 63–72. [Google Scholar]
- Azab, A.; Ning, P.; Shah, J.; Bhutkar, R.; Ganju, K.; Shen, W.; Wang, Y. Hypervision Across Worlds: Real-time Kernel Protection from the ARM TrustZone Secure World. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS), Scottsdale, AZ, USA, 3–7 November 2014; ACM: New York, NY, USA, 2014; pp. 90–102. [Google Scholar] [CrossRef]
- Van Bulck, J.; Minkin, M.; Weisse, O.; Genkin, D.; Kasikci, B.; Piessens, F.; Silberstein, M.; Wenisch, T.F.; Yarom, Y.; Strackx, R. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. In Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, USA, 15–17 August 2018; USENIX Association: Berkeley, CA, USA, 2018; pp. 991–1008. [Google Scholar]
- Van Bulck, J.; Piessens, F.; Strackx, R. LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–21 May 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 54–72. [Google Scholar] [CrossRef]
- Chen, T.; Zang, B.; Chen, H.; Guan, H.; TruSpy: Cache Side-Channel Information Leakage from the Secure World on ARM Devices. IACR Cryptology ePrint Archive 2017, 2017:1169. Available online: https://eprint.iacr.org/2017/1169 (accessed on 30 September 2025).
- Xu, L.; Yang, J.; Li, Z.; Zhao, Y.; Zhang, T.; Wang, T. TruSense: Information Leakage from ARM TrustZone via Cache Side Channels. In Proceedings of the IEEE International Conference on Computer Design (ICCD), Abu Dhabi, UAE, 17–20 November 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 471–474. [Google Scholar] [CrossRef]
- Tang, A.; Sethumadhavan, S.; Stolfo, S. CLKSCREW: Exposing the Perils of Security-Oblivious Energy Management. In Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada, 16–18 August 2017; USENIX Association: Berkeley, CA, USA, 2017; pp. 1057–1074. [Google Scholar]
- Chen, G.; Chen, S.; Xiao, Y.; Zhang, Y.; Lin, Z.; Lai, T.H.; Xing, X. SoK: Understanding Security Vulnerabilities of Software-based Trusted Execution Environments. In Proceedings of the IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–22 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1003–1020. [Google Scholar] [CrossRef]
- Asanović, K.; Patterson, D. Instruction Sets Should Be Free: The Case for RISC-V. EECS Department, University of California, Berkeley, Technical Report UCB/EECS-2014-146, 2014. Available online: https://www2.eecs.berkeley.edu/Pubs/TechRpts/2014/EECS-2014-146.html (accessed on 30 September 2025).
- Anders, J.; Andreu, P.; Becker, B.; Becker, S.; Cantoro, R.; Deligiannis, N.I.; Elhamawy, N.; Faller, T.; Hernandez, C.; Mentens, N.; Rizi, M.N. A Survey of Recent Developments in Testability, Safety and Security of RISC-V Processors. In Proceedings of the 2023 IEEE European Test Symposium (ETS), Venice, Italy, 22–26 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–10. [Google Scholar]
- Feng, X.; Su, Y.; Liu, J.; Xu, C.; Liu, Y.; Xu, H.; Chen, K. A Survey of Confidential Computing. IET Communications 2023, 17, 1234–1249. [Google Scholar] [CrossRef]
- Maene, P. , Götzfried, J., de Clercq, R., Müller, T., Freiling, F., & Verbauwhede, I. (2018). Hardware-Based Trusted Computing Architectures for Isolation and Attestation. IEEE Transactions on Computers, 67, 361–374.
- Muñoz, A. , Ríos, R., Román, R., & López, J. (2023). A survey on the (in)security of trusted execution environments. Computers & Security, 103180.
- Lu, T. A Survey on RISC-V Security: Hardware and Architecture. arXiv Preprint 2021, arXiv:2107.04175. [Google Scholar] [CrossRef]
- M. Schneider, R. J. Masti, S. Shinde, S. Čapkun, and R. 2022; arXiv:2205.12742. [CrossRef]
- M. Li, Y. Yang, G. Chen, M. Yan, and Y. Zhang, “SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments,” in Proc. 19th ACM Asia Conference on Computer and Communications Security (ASIA CCS), 2024. [CrossRef]
- T. Geppert, J. Anderegg, L. Frei, S. Moeller, S. Deml, D. Sturzenegger, et al., “Trusted Execution Environments: Applications and Organizational Challenges,” Frontiers in Computer Science, vol. 4, article 930741, 2022. [CrossRef]
- GlobalPlatform. TEE v1.3; Technical Specification, 2023. https://globalplatform.org/wp-content/uploads/2022/05/GPD_SPE_009-GPD_TEE_SystemArchitecture_v1.3_PublicRelease_signed.
- Lee, D.; Kohlbrenner, D.; Shinde, S.; Asanović, K.; Song, D. Keystone: An Open Framework for Architecting Trusted Execution Environments. Proceedings of the Fifteenth European Conference on Computer Systems (EuroSys). ACM, 2020; pp. 1–16.
- Costan, V.; Lebedev, I.; Devadas, S. Sanctum: Minimal Hardware Extensions for Strong Software Isolation. 25th USENIX Security Symposium. USENIX Association, 2016; pp. 857–874.
- Feng, S.; Aublin, P.-L.; Ta-Min, R.; Felber, P.; Le Métayer, D. TIMBER-V: Tag-Isolated Memory Bringing Enclaves to RISC-V. 2021 IEEE 27th International Symposium on High Performance Computer Architecture (HPCA); IEEE, 2021; pp. 432–445.
- Mashtizadeh, A.; Wentzlaff, D. MI6: Secure Enclaves in a Speculative Out-of-Order Processor. 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA); IEEE, 2019; pp. 42–55.
- Vilanova, L.; Weisse, O.; Bartolini, A.; Bartolini, M.; Sampaio, L. HECTOR-V: A Heterogeneous Architecture for Trusted Execution in RISC-V. 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE); IEEE, 2020; pp. 1464–1469.
- Bahmani, R.; Knauth, T.; Sammler, M.; Weiser, S.; Fetzer, C. CURE: A Security Architecture with CUstomizable Enclaves. 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN); IEEE, 2020; pp. 1–14.
- Stapf, E.; Weiser, S.; Bahmani, R.; Knauth, T.; Fetzer, C. Cerberus: A Memory Isolation Framework for Enclaves. 2021 IEEE International Symposium on Secure and Private Execution Environments (SEED); IEEE, 2021; pp. 1–13.
- Sahita, R.; Ge, Q.; Liang, J.; Love, E.; Costan, V.; Li, S. CoVE: Confidential Computing Architecture for RISC-V. Proceedings of the 2023 IEEE Symposium on Security and Privacy (S&P); IEEE, 2023; pp. 1–17.
- Nasahl, J.; Hoang, T.; Pinto, S.; Köpf, B. WorldGuard: Enforcing Strong Isolation for Trusted Execution on RISC-V. 2024 IEEE European Symposium on Security and Privacy (EuroS&P); IEEE, 2024; pp. 112–127.
- Shah, H.; Nguyen, K.; El Haji, M.; Dashti, M.; Knauth, T.; Bahmani, R. SPEAR-V: Software-isolated Enclaves on RISC-V. 2022 IEEE International Conference on Computer Design (ICCD); IEEE, 2022; pp. 289–296.
- Zhang, Y.; Gu, R.; Wang, H.; Yang, Y.; Li, J.; Wang, X. VirTEE: A Secure Virtualization-based TEE for RISC-V. 2022 IEEE International Conference on Parallel and Distributed Systems (ICPADS); IEEE, 2022; pp. 564–572.
- Koh, H.; Choi, M.; Lee, J.; Park, J. DORAMI: Lightweight Trusted Execution with Enhanced PMP on RISC-V. 2024 IEEE International Symposium on High-Performance Computer Architecture (HPCA); IEEE, 2024; pp. 745–758.
- Shinde, S.; Knauth, T.; Weisse, O.; Asanović, K.; Song, D. Elasticlave: An Efficient Memory Model for Enclaves. 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI); USENIX Association, 2020; pp. 523–539.
- Sahita, R.; Ge, Q.; Li, S.; Costan, V. AP-TEE: Application Platform Trusted Execution Environment Specification for RISC-V. RISC-V Summit, 2023. Available online: https://github.com/riscv/tee (accessed on 27 September 2025).
- Shen, R.; Wu, J.; Chen, Z.; Zuo, C.; Guo, Y.; Chen, H. Penglai: Scaling Enclave Applications with Dynamic Memory Management. 16th European Conference on Computer Systems (EuroSys); ACM, 2021; pp. 275–290.
- Dessouky, G.; Cheang, K.; Bhatotia, P.; Weiser, S.; Bahmani, R. AnyTEE: A Portable and Open Framework for Enclaves. Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security (AsiaCCS); ACM, 2021; pp. 297–310.
- Intel Corporation. Intel Software Guard Extensions (Intel SGX) Programming Reference. Intel Developer Manual, 2020. Available online: https://www.intel.com/sgx (accessed on 27 September 2025).
- Kaplan, D.; Powell, J.; Woller, T. AMD Memory Encryption Technologies. AMD White Paper, 2016. [Google Scholar]
- Alves, T.; Felton, D. TrustZone: Integrated Hardware and Software Security. ARM White Paper, 2004. [Google Scholar]
- Ge, Q.; Yarom, Y.; Cock, D.; Heiser, G. A Survey of Microarchitectural Timing Attacks and Countermeasures on Modern Processors. ACM Computing Surveys 2019, 54, 1–36. [Google Scholar]
- Van Bulck, J.; Minkin, M.; Weisse, O.; Genkin, D.; Kasikci, B.; Piessens, F.; Silberstein, M.; Wenisch, T.; Yarom, Y.; Strackx, R. Foreshadow: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution. 27th USENIX Security Symposium, 2018; 991–1008. [Google Scholar]
- Van Bulck, J.; Minkin, M.; Genkin, D.; Kasikci, B.; Piessens, F.; Silberstein, M.; Strackx, R. LVI: Hijacking Transient Execution through Load Value Injection. 2020 IEEE Symposium on Security and Privacy (S&P); IEEE, 2020; pp. 54–72.
- Hetzelt, F.; Buhren, R. SEVered: Subverting AMD’s Virtual Machine Encryption. Proceedings of the 11th European Workshop on Systems Security (EuroSec), 2018; pp. 1–6.
- Anders, J.; Andreu, P.; Becker, B.; Becker, S.; Cantoro, R.; Deligiannis, N.I.; Elhamawy, N.; Faller, T.; Hernandez, C.; Mentens, N.; Rizi, M.N. A Survey of Recent Developments in Testability, Safety and Security of RISC-V Processors. 2023 IEEE European Test Symposium (ETS), IEEE, May 2023; pp. 1–10.
- Wong, M.M.; Haj-Yahya, J.H.; Chattopadhyay, A. SMARTS: Secure Memory Assurance of RISC-V Trusted SoC. Proc. 7th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), ACM, June 2018; pp. 1–8. [CrossRef]
- Krentz, K.F.; Voigt, T. Reducing trust assumptions with OSCORE, RISC-V, and Layer 2 one-time passwords. Int. Symp. Found. Pract. Secur., Springer Nature Switzerland, Dec 2022; pp. 389–405.
- Cheang, K.; Rasmussen, C.; Lee, D.; Kohlbrenner, D.W.; Asanović, K.; Seshia, S.A. Verifying RISC-V Physical Memory Protection. arXiv 2022. Available online: https://arxiv.org/abs/2211.02179 (accessed on 30 September 2025)arXiv:2211.02179.
- Kocher, P.; Horn, J.; Fogh, A.; Genkin, D.; Gruss, D.; Haas, W.; Hamburg, M.; Lipp, M.; Mangard, S.; Prescher, T.; Schwarz, M.; Yarom, Y. Spectre Attacks: Exploiting Speculative Execution. Commun. ACM 2020, 63(7), 93–101. [Google Scholar] [CrossRef]
- Li, T.; Hopkins, B.; Parameswaran, S. SIMF: Single-Instruction Multiple-Flush Mechanism for Processor Temporal Isolation. arXiv 2020. Available online: https://arxiv.org/abs/2011.10249 (accessed on 30 September 2025)arXiv:2011.10249.
- Stapf, E.; Jauernig, P.; Brasser, F.; Sadeghi, A.-R. In Hardware We Trust? From TPM to Enclave Computing on RISC-V. 2021 IFIP/IEEE 29th Int. Conf. Very Large Scale Integration (VLSI-SoC), IEEE, Oct 2021; pp. 1–6.
- Schneider, M.; Dhar, A.C.; Puddu, I.; Kostiainen, K.; Capkun, S. Composite Enclaves: Towards Disaggregated Trusted Execution. arXiv 2020. Available online: https://arxiv.org/abs/2010.10416 (accessed on 30 September 2025)arXiv:2010.10416.
- Kieu-Do-Nguyen, B.; Nguyen, K.D.; Dang, T.K.; Binh, N.T.; Pham-Quoc, C.; Tran, N.T.; Pham, C.K.; Hoang, T.T. A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3. Electronics 2024, 13(13), 2508. [Google Scholar] [CrossRef]
- Chen, Y.; Chen, H.; Chen, S.; Han, C.; Ye, W.; Liu, Y.; Zhou, H. DITES: A lightweight and flexible dual-core isolated trusted execution SoC based on RISC-V. Sensors 2022, 22(16), 5981. [Google Scholar] [CrossRef] [PubMed]
- Hoang, T.T.; Duran, C.; Serrano, R.; Sarmiento, M.; Nguyen, K.D.; Tsukamoto, A.; Suzaki, K.; Pham, C.K. Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling. IEEE Access 2022, 10, 46014–46027. [Google Scholar] [CrossRef]
- Pinto, S.; Martins, J.; Rodriguez, M.; Cunha, L.; Schmalz, G.; Moslehner, U.; Dieffenbach, K.; Roecker, T. RISC-V Needs Secure ’Wheels’: The MCU Initiator-Side Perspective. arXiv 2024. Available online: https://arxiv.org/abs/2410.09839 (accessed on 30 September 2025)arXiv:2410.09839.
- Pan, S.; Peng, X.; Man, Z.; Zhao, X.; Zhang, D.; Yang, B.; Du, D.; Lu, H.; Xia, Y.; Li, X. Dep-TEE: Decoupled Memory Protection for Secure and Scalable Inter-enclave Communication on RISC-V. Proc. 30th Asia and South Pacific Design Automation Conference (ASPDAC ’25), ACM, 2025; pp. 454–460. [CrossRef]
- Anders, J.; Andreu, P.; Becker, B.; Becker, S.; Cantoro, R.; Deligiannis, N.I.; Elhamawy, N.; Faller, T.; Hernandez, C.; Mentens, N.; Rizi, M.N. A Survey of Recent Developments in Testability, Safety and Security of RISC-V Processors. 2023 IEEE European Test Symposium (ETS), IEEE, May 2023; pp. 1–10.
- Wong, M.M.; Haj-Yahya, J.H.; Chattopadhyay, A. SMARTS: Secure Memory Assurance of RISC-V Trusted SoC. Proc. 7th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP), ACM, June 2018; pp. 1–8. [CrossRef]
- Krentz, K.F.; Voigt, T. Reducing trust assumptions with OSCORE, RISC-V, and Layer 2 one-time passwords. Int. Symp. Found. Pract. Secur., Springer Nature Switzerland, Dec 2022; pp. 389–405.
- Cheang, K.; Rasmussen, C.; Lee, D.; Kohlbrenner, D.W.; Asanović, K.; Seshia, S.A. Verifying RISC-V Physical Memory Protection. arXiv 2022. Available online: https://arxiv.org/abs/2211.02179 (accessed on 30 September 2025)arXiv:2211.02179.
- Kocher, P.; Horn, J.; Fogh, A.; Genkin, D.; Gruss, D.; Haas, W.; Hamburg, M.; Lipp, M.; Mangard, S.; Prescher, T.; Schwarz, M.; Yarom, Y. Spectre Attacks: Exploiting Speculative Execution. Commun. ACM 2020, 63(7), 93–101. [Google Scholar] [CrossRef]
- Li, T.; Hopkins, B.; Parameswaran, S. SIMF: Single-Instruction Multiple-Flush Mechanism for Processor Temporal Isolation. arXiv 2020. Available online: https://arxiv.org/abs/2011.10249 (accessed on 30 September 2025)arXiv:2011.10249.
- Stapf, E.; Jauernig, P.; Brasser, F.; Sadeghi, A.-R. In Hardware We Trust? From TPM to Enclave Computing on RISC-V. 2021 IFIP/IEEE 29th Int. Conf. Very Large Scale Integration (VLSI-SoC), IEEE, Oct 2021; pp. 1–6.
- Schneider, M.; Dhar, A.C.; Puddu, I.; Kostiainen, K.; Capkun, S. Composite Enclaves: Towards Disaggregated Trusted Execution. arXiv 2020. Available online: https://arxiv.org/abs/2010.10416 (accessed on 30 September 2025)arXiv:2010.10416.
- Kieu-Do-Nguyen, B.; Nguyen, K.D.; Dang, T.K.; Binh, N.T.; Pham-Quoc, C.; Tran, N.T.; Pham, C.K.; Hoang, T.T. A Trusted Execution Environment RISC-V System-on-Chip Compatible with Transport Layer Security 1.3. Electronics 2024, 13(13), 2508. [Google Scholar] [CrossRef]
- Chen, Y.; Chen, H.; Chen, S.; Han, C.; Ye, W.; Liu, Y.; Zhou, H. DITES: A lightweight and flexible dual-core isolated trusted execution SoC based on RISC-V. Sensors 2022, 22(16), 5981. [Google Scholar] [CrossRef] [PubMed]
- Hoang, T.T.; Duran, C.; Serrano, R.; Sarmiento, M.; Nguyen, K.D.; Tsukamoto, A.; Suzaki, K.; Pham, C.K. Trusted Execution Environment Hardware by Isolated Heterogeneous Architecture for Key Scheduling. IEEE Access 2022, 10, 46014–46027. [Google Scholar] [CrossRef]
- Pinto, S.; Martins, J.; Rodriguez, M.; Cunha, L.; Schmalz, G.; Moslehner, U.; Dieffenbach, K.; Roecker, T. RISC-V Needs Secure ’Wheels’: The MCU Initiator-Side Perspective. arXiv 2024. Available online: https://arxiv.org/abs/2410.09839 (accessed on 30 September 2025)arXiv:2410.09839.
- Pan, S.; Peng, X.; Man, Z.; Zhao, X.; Zhang, D.; Yang, B.; Du, D.; Lu, H.; Xia, Y.; Li, X. Dep-TEE: Decoupled Memory Protection for Secure and Scalable Inter-enclave Communication on RISC-V. Proc. 30th Asia and South Pacific Design Automation Conference (ASPDAC ’25), ACM, 2025; pp. 454–460. [CrossRef]
- E. Feng, X. Lu, D. Du, B. Yang, X. Jiang, Y. Xia, B. Zang, and H. Chen, “Scalable Memory Protection in the PENGLAI Enclave,” in 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21), USENIX Association, Jul. 2021, pp. 275–294. ISBN 978-1-939133-22-9.
- G. Dessouky, A.-R. Sadeghi, and E. Stapf, “Enclave Computing on RISC-V: A Brighter Future for Security?,” in Workshop on Secure RISC-V Architecture Design (SECRISC-V), Apr. 2020, vol. 20.
- A.-T. Le, “Research of RISC-V Out-of-order Processor Cache-Based Side-Channel Attacks: Systematic Analysis, Security Models and Countermeasures,” Ph.D. dissertation, University of Electro-Communications, Tokyo, Japan, 2023.
- V. Donnini, “Integration of the DICE Specification into the Keystone Framework,” Ph.D. dissertation, Politecnico di Torino, 2023.
- J. Z. Yu, S. Shinde, T. E. Carlson, and P. Saxena, “Elasticlave: An Efficient Memory Model for Enclaves,” in 31st USENIX Security Symposium (USENIX Security 22), USENIX Association, 2022, pp. 4111–4128.
- M. Boubakri, F. Chiatante, and B. Zouari, “Open Portable Trusted Execution Environment Framework for RISC-V,” in Proc. 2021 IEEE 19th International Conference on Embedded and Ubiquitous Computing (EUC), Shenyang, China, Oct. 2021, pp. 1–8. [CrossRef]
- K. Suzaki, K. Nakajima, T. Oi, and A. Tsukamoto, “Library Implementation and Performance Analysis of GlobalPlatform TEE Internal API for Intel SGX and RISC-V Keystone,” in Proc. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Dec. 2020, pp. 200–207. [CrossRef]
- F. Zhang, L. Zhou, Y. Zhang, M. Ren, and Y. Deng, “Trusted Execution Environment: State-of-the-Art and Future Directions,” Journal of Computer Research and Development, vol. 61, no. 1, pp. 243–260, 2024. [CrossRef]
Short Biography of Authors
![]() |
Marouene Boubakri received the double Engineering degree from the Higher School of Communication of Tunis (SUP’COM), Tunisia, and EURECOM, France. He is currently pursuing the Ph.D. degree in Electronics and Information and Communication Technologies at the Tunisia Polytechnic School. His research interests include computer architecture security, trusted execution environments, and confidential computing, with a focus on RISC-V. He actively participates in the RISC-V community to advance secure hardware and software ecosystems. |
![]() |
Belhassen Zouari received the Doctorate (French Ph.D.) from the University of Paris6, Paris, France, in 1993, in computer science, and the “Habilitation Universitaire” from the University of Tunis, Tunis, Tunisia, in 2005.,He is a Professor in Computer Science at the Higher School of Communications Sup’Com-member of Mediatron Lab- University of Carthage, Tunisia. His activities include research works in the fields of verification of automated systems and security issues. He worked on formal verification methods based on coloured Petri nets and applied the related techniques in various fields as Flexible Manufacturing Systems,Wireless Sensor Networks and Business Process Management. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

