I. Introduction
Today’s computing services are often offered in remote environment where control over data is limited. Of the three states of data that constitute the data security triad (i.e., data-at-rest, data-in-transit, data-in-use), the most worrying situation unarguably relates to attacks targeting the data-in-use since in this state data needs to be decrypted before being processed. For this reason, in recent years, there has been a major industrial and research trend to close the gap in data security by protecting data while it is being used. The Confidential Computing Consortium [1] is bringing together hardware vendors, cloud providers, and software developers to accelerate the adoption of the most mature technology for privacy-preserving computing, i.e., hardware-assisted Trusted Execution Environment (TEE). In the ideal TEE model, a user is expected to deploy her TEE into the untrusted platform and thus have the sensitive code and data in a protected enclave of her ownership. However, it is frequent that the TEE is in the hand of a third-party allowing customers to take advantage of its benefits —i.e., protection even against malicious platform providers— without having to deal with the implementation and management of the secure enclave, also denoted as TEE-as-a-Service. Or more, the TEE could be part of a particular business service offering privacy-preserving computing to customers. In these situations, the number of entities to trust grows and the user must be confident that not only the TEE hardware vendor is benign but also that the third-party owning the TEE code is virtuous. To the best of our knowledge, there is no way to give guarantees that, e.g., a malicious TEE developer did not left a backdoor to extract sensitive data from the TEE. We found in literature some works in this area [2] [3] [4] where researchers explored the concept of a two-way sandbox to secure an application even against a malicious TEE service provider. These studies are promising but they give to customers no ways to formally verify that the TEE is secured against leakages and actually does what is expected to do.