CoVE: Towards Confidential Computing on RISC-V Platforms

CoVE: Towards Confidential Computing on RISC-V Platforms

Abstract

This paper introduces CoVE, a proposed reference architecture for implementing Confidential Computing on RISC-V platforms. It addresses the vulnerability of large Trusted Computing Bases (TCBs) in traditional multi-tenant environments by defining hardware-attested Trusted Execution Environments (TEEs). CoVE outlines necessary ISA, non-ISA, and System-on-Chip requirements to provide quantifiable TCB minimization suitable for privacy-oriented workloads.

Report

CoVE: Towards Confidential Computing on RISC-V Platforms

Key Highlights

  • Core Goal: Proposes a reference architecture, CoVE (Confidential Virtual Machine), to bring Confidential Computing (CC) capabilities to RISC-V platforms.
  • Problem Addressed: Current multi-tenant platforms include platform firmware, host OS, and hypervisors in the Trusted Computing Base (TCB), making them ill-suited for privacy-oriented workloads.
  • Solution Approach: Leverages the clean-slate design potential of the RISC-V architecture to establish hardware-attested Trusted Execution Environments (TEEs).
  • Objective: Define necessary components to minimize the TCB footprint for tenant payloads (VMs, containers, applications) running on RISC-V hardware.

Technical Details

  • Architecture Focus: CoVE describes the ISA (Instruction Set Architecture) and non-ISA Extension requirements needed to implement a Confidential Virtual Machine (CVM) environment.
  • Scope: The requirements discussed cover ISA extensions, non-ISA system extensions, and fundamental System-on-Chip (SoC) design aspects.
  • Foundation: The paper asserts that the RISC-V architecture provides a strong foundation for meeting these security requirements in a clean-slate manner, bypassing legacy security issues.
  • Core Requirement: Implementation requires the use of HW-attested TEEs for robust data-in-use protection.

Implications

  • Standardization Driver: CoVE provides a critical reference architecture, accelerating the standardization and definition of crucial security features necessary for enterprise and cloud RISC-V deployments.
  • Increased Trust: By minimizing the TCB, this development allows tenants to run sensitive, privacy-oriented workloads knowing that the host OS, hypervisor, or platform operators cannot access their data.
  • Market Viability: Successful implementation of CoVE is vital for RISC-V to compete effectively against established architectures (like x86) that already offer robust TEE solutions (e.g., Intel SGX/TDX, AMD SEV).
lock-1

Technical Deep Dive Available

This public summary covers the essentials. The Full Report contains exclusive architectural diagrams, performance audits, and deep-dive technical analysis reserved for our members.

Read Full Report →