A Survey of RISC-V Secure Enclaves and Trusted Execution Environments

Read the full article See related articles

Discuss this preprint

Start a discussion What are Sciety discussions?

Listed in

This article is not in any list yet, why not save it to one of your lists.
Log in to save this article

Abstract

RISC-V has emerged as a compelling alternative to proprietary instruction set architectures, distinguished by its openness, extensibility, and modularity. As the ecosystem matures, attention has turned to building confidential computing foundations, notably Trusted Execution Environments (TEEs) and secure enclaves, to support sensitive workloads. These efforts explore a variety of design directions, yet reveal important trade-offs. Some approaches achieve strong isolation guarantees but fall short in scalability or broad adoption. Others introduce defenses such as memory protection or side-channel resistance, though often with significant performance costs that limit deployment in constrained systems. Lightweight enclaves address embedded contexts but lack the advanced security features demanded by complex applications. In addition, early stage development, complex programming models, and limited real-world validation hinder their usability. This survey reviews the current landscape of RISC-V TEEs and secure enclaves, analyzing architectural principles, strengths, and weaknesses. To the best of our knowledge, this is the first work to present such a consolidated view. Finally, we highlight open challenges and research opportunities toward establishing a cohesive and trustworthy RISC-V trusted computing ecosystem.

Article activity feed