Skip to Contact Form

Securing TEE Implementations

Confidential computing security research and tooling to build secure trusted execution environments. Expert security for Intel SGX, TDX, AMD SEV-SNP, ARM TrustZone, and AWS Nitro Enclaves.

TRUSTED BY TOP ORGANIZATIONS

TEE Resources & Insights

Latest blog posts, webinars, and social media updates on Trusted Execution Environments

Security Audit

Meta WhatsApp Private Processing Security Review

Comprehensive security review of WhatsApp Private Processing, a confidential computing service using AMD SEV-SNP and NVIDIA confidential computing to enable AI features while preserving privacy guarantees.

Security Audit

MobileCoin Security Assessment

Comprehensive security assessment of MobileCoin's TEE-based cryptocurrency implementation, focusing on Intel SGX enclaves, consensus protocols, and cryptographic security.

Recorded Webinar

Top TEE Bugs You Should Fix Before Your Audit

Join us for an in-depth discussion of the most common vulnerabilities found in Trusted Execution Environment implementations and learn how to identify and fix them before your security audit.

Research

Vulnerabilities in LUKS2 Disk Encryption for Confidential VMs

Critical vulnerabilities discovered in LUKS2 disk encryption that impact confidential VM security. Learn about the attack vectors and how to protect your TEE deployments.

Research

A Few Notes on AWS Nitro Enclaves: Attack Surface

Key insights into AWS Nitro Enclaves image construction and attestation. Learn about enclave identity verification and its security implications.

Research

Enhancing Trust for SGX Enclaves

Best practices for trust establishment in Intel SGX enclaves. Learn about attestation workflows and techniques for strengthening enclave security guarantees.

Recorded Webinar

After Wiretap and Battering RAM: TEE Security for Blockchain

Physical attacks on Intel TDX/SGX and AMD SEV-SNP now allow attackers with $50 in hardware to extract attestation keys. Learn what this means for your TEE-based infrastructure.

Flexible Engagement Models

Right-sized TEE security guidance at every stage of your project

Not Sure Where to Start?

Book a free office hours session to discuss your TEE implementation. Get expert guidance on platform selection, architectural trade-offs, and security best practices without any commitment.

Book Office Hours

Trusted Execution Environment Webinars

Expert insights on TEE security, vulnerabilities, and implementation best practices

Recorded

Top TEE Bugs You Should Fix Before Your Audit

Join us for an in-depth discussion of the most common vulnerabilities found in Trusted Execution Environment implementations and learn how to identify and fix them before your security audit.

Recorded

After Wiretap and Battering RAM: What Changes for TEE-Based Blockchain Infrastructure

Physical attacks on Intel TDX/SGX and AMD SEV-SNP now allow attackers with $50 in hardware to extract attestation keys, view encrypted data, and tamper with confidential workloads. Intel and AMD won't patch these vulnerabilities.

Ready to Secure Your TEE Implementation?

From platform selection guidance to comprehensive security assessments - expert TEE security at every stage

Frequently Asked Questions

Common questions about TEE security and our services

A Trusted Execution Environment is a secure area within a main processor that provides a protected environment for executing sensitive code and storing confidential data. TEEs isolate code and data from the rest of the system, including the operating system, ensuring that sensitive operations remain secure even if the main OS is compromised. Major TEE technologies include Intel SGX, AMD SEV-SNP, ARM TrustZone, and AWS Nitro Enclaves.
Recent research has demonstrated that physical attacks (like voltage glitching and memory access) can compromise TEE attestation keys and extract encrypted data from platforms like Intel SGX and AMD SEV-SNP. These attacks require physical access to the hardware but can be executed with relatively inexpensive equipment ($50-100). Intel and AMD have stated they will not patch these vulnerabilities as they are considered outside their threat model. This means organizations must carefully consider whether cloud-hosted or self-hosted TEE deployments better match their security requirements.

Our TEE security assessments include:

→ Architecture and threat model review

→ Code-level security analysis of enclave implementations

→ Attestation protocol verification

→ Side-channel attack evaluation

→ Memory safety and isolation testing

→ Key management and cryptographic implementation review

→ Custom tooling development when needed

→ Detailed technical report with remediation guidance

Engagement duration varies based on scope and complexity:

Office Hours - 1-2 hour sessions for focused guidance

Design Review - 1-2 weeks for architectural assessment

Implementation Review - 2-4 weeks for comprehensive code analysis

Ongoing Support - Continuous engagement with async communication

We'll work with you to scope the engagement appropriately for your project stage and budget.

Trail of Bits brings unique advantages to TEE security:

→ Active researchers who have discovered and published vulnerabilities in major TEE platforms

→ Deep expertise across all major TEE technologies (SGX, SEV-SNP, TrustZone, Nitro)

→ Custom security tooling development for TEE analysis

→ Multi-methodology approach combining manual review with automated analysis

→ Focus on eliminating vulnerability classes, not just finding individual bugs

→ Knowledge transfer and team training included in all engagements

→ Track record of hundreds of security assessments for leading tech companies