“…To analyze these TEE containers, we propose a taxonomy including a set of key security properties expected from a Tcon: 1) their threat models, 2) their supports for isolation between the untrusted OS and the container (through Ecall/Ocall/exception interfaces), 3) their supports for isolation within the container (particularly for those running untrusted code), 4) their mechanism for attestation, 5) protection for storage and 6) their side-channel control. These properties are summarized from Tcon-related publications [105], [109], [50], [87], [80], [62], [81], [61], [59], [97], [48], [74] and documentations [18], [26], [34], [13]. In the rest of the section, we first present popular Tcons and their backgrounds, and then analyze them using the taxonomy.…”