pith. machine review for the scientific record. sign in

arxiv: 2508.20962 · v2 · submitted 2025-08-28 · 💻 cs.CR · cs.SE

Recognition: unknown

Characterizing Trust Boundary Vulnerabilities in TEE Containers: An Empirical Study

Authors on Pith no claims yet
classification 💻 cs.CR cs.SE
keywords tconsattackconfidentialcontainersexecutionlayersorchestrationsecure
0
0 comments X
read the original abstract

Trusted Execution Environments (TEEs) have become a cornerstone of confidential computing, attracting significant attention from academia and industry. To support secure and scalable application deployment on confidential clouds, TEE containers (Tcons) have been introduced as middleware to shield applications from malicious operating systems and orchestration layers while preserving usability. In this paper, we present the first comprehensive analysis of Tcons, focusing on three critical layers: OS interfaces, encrypted I/O, and orchestration mechanisms. To enable systematic evaluation, we design TBouncer, an automated analyzer that precisely exercises and benchmarks Tcon isolation boundaries. Our study uncovers fundamental flaws in existing Tcons, leading to exploitable vulnerabilities such as code execution, denial-of-service, and information leakage. In total, we identify six attack vectors, twelve new bugs, and three CVEs. These findings provide new insights into the underestimated attack surface of Tcons and highlight key directions for building more secure and trustworthy container solutions.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Forward citations

Cited by 1 Pith paper

Reviewed papers in the Pith corpus that reference this work. Sorted by Pith novelty score.

  1. EBCC: Enclave-Backed Confidential Containers via OCI-Compatible Runtime Integration

    cs.CR 2026-05 unverdicted novelty 7.0

    EBCC provides an OCI-compatible runtime architecture that unifies REE and TEE stages for confidential containers while preserving standard lifecycle operations behind a backend adapter.