CAEC: Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA

11th IEEE European Symposium on Security and Privacy (EuroS&P 2026)
*Imperial College London, London, United Kingdom, Dartmouth College, Hanover, NH, USA

Abstract

Confidential Virtual Machines (CVMs) are increasingly adopted to protect sensitive workloads from privileged adversaries such as the hypervisor. While they provide strong isolation guarantees, existing CVM architectures lack first-class mechanisms for inter-CVM data sharing due to their disjoint memory model, making inter-CVM data exchange a performance bottleneck in compartmentalized or collaborative multi-CVM systems. Under this model, a CVM’s accessible memory is either shared with the hypervisor or protected from both the hypervisor and all other CVMs. This design simplifies reasoning about memory ownership; however, it fundamentally precludes plaintext data sharing between CVMs because all inter-CVM communication must pass through hypervisor-accessible memory, requiring costly encryption and decryption to preserve confidentiality and integrity.

In this paper, we introduce CAEC, a system that enables protected memory sharing between CVMs. CAEC builds on Arm Confidential Compute Architecture (CCA) and extends its firmware to support Confidential Shared Memory (CSM), a memory region securely shared between multiple CVMs while remaining inaccessible to the hypervisor and all non-participating CVMs. CAEC’s design is fully compatible with CCA hardware and introduces only a modest increase (4%) in CCA firmware code size. CAEC delivers substantial performance benefits across a range of workloads. For instance, inter-CVM communication over CAEC achieves up to 209x reduction in CPU cycles compared to encryption-based mechanisms over hypervisor-accessible shared memory. By combining high performance, strong isolation guarantees, and attestable sharing semantics, CAEC provides a practical and scalable foundation for the next generation of trusted multi-CVM services across both edge and cloud environments.

Overview

Current confidential computing architectures rely on a disjoint memory model: a Confidential Virtual Machine (CVM) owns protected memory isolated from both the hypervisor and other CVMs, while shared memory can only exist between a CVM and the hypervisor. While this model simplifies memory ownership, it prevents direct memory sharing between CVMs. As a result, inter-CVM communication must always be mediated by the untrusted hypervisor and therefore requires expensive encryption. This limitation is increasingly problematic for security-sensitive workloads that depend on collaboration or compartmentalization across multiple CVMs.

CAEC addresses this limitation by introducing Confidential Shared Memory (CSM), a protected memory region that can be shared between two or more CVMs while remaining inaccessible to the hypervisor and to all non-participating CVMs. Built on top of Arm Confidential Compute Architecture (CCA), CAEC extends firmware support with only modest changes while preserving compatibility with existing CCA hardware.

More concretely, CAEC provides:

Joint Project

CAEC is part of the broader C3Infer effort: a framework for compartmentalized, confidential, and certified AI inference. C3Infer connects CAEC’s protected inter-CVM communication mechanisms with the wider goal of building secure, compartmentalized AI systems that can preserve confidentiality while supporting efficient collaboration across isolated components.

Inter-CVM Communication Modes

Figure 1 illustrates the motivation behind CAEC by comparing two existing inter-communication modes with CAEC.

Comparison of hypervisor-mediated communication, hypervisor-accessible shared memory, and CAEC confidential shared memory between CVMs

Figure 1. Communication modes between two CVMs.

Cyan: memory regions accessible to the first CVM, Green: memory regions accessible to the second CVM, Purple: memory regions accessible to the hypervisor.

Communication bechmark

Performance evaluation results for CAEC showing inter-CVM communication improvements

Figure 2. Communication Benchmark of CAEC.

Figure 2 summarizes CAEC’s main benchmark that is communication benchmark between two CVMs exchanging messages through shared memory. The evaluation compares four modes: plaintext communication over normal-world (NW) shared memory, encrypted communication over NW shared memory using OpenSSL, encrypted communication over NW shared memory using MbedTLS, and CAEC, which is using CSM.

Across latency, throughput, and CPU usage, CAEC consistently 1) outperforms both encrypted NW-based configurations, and the gap widens as message size increases. These results highlight the substantial overhead introduced by cryptographic protection when using NW shared memory for inter-realm communication, a cost that is elimionated by the CAEC’s use of CSM. The results also suggests that CAEC achieves performance equivalent to plaintext NW communication, demonstrating that the previously observed differences between \name and encrypted modes over NW memory stem entirely from cryptographic processing rather than from differences in memory-access latency, caching effects, or other architectural factors.

Highlights include:

BibTeX

@article{abdollahi2025confidential,
title={Confidential, Attestable, and Efficient Inter-CVM Communication with Arm CCA},
author={Abdollahi, Sina and Sadi, Amir Al and Kogias, Marios and Kotz, David and Haddadi, Hamed},
journal={arXiv preprint arXiv:2512.01594},
year={2025}
}