Architecture Split: Core vs Host

Host Side

Less Trusted
Runs outside the chip boundary
Requests services via protocols
Handles application logic

Security Boundary

Strict interface contracts

REQ
RES

Core Side

Highly Trusted
Inside the chip, minimal TCB
Security-critical logic
Secrets remain protected

Separation simplifies threat modeling — only attested results are exposed to the host.

Previous Slide Next Slide