Netinfo Security ›› 2026, Vol. 26 ›› Issue (2): 189-210.doi: 10.3969/j.issn.1671-1122.2026.02.002

Previous Articles     Next Articles

CCASim: Research on Performance Simulator for Arm Confidential Compute Architecture

LIN Tiantian1,2, WANG Yitian1,2, WANG Xiaohang1,2(), ZHU Ting1,2, REN Kui1,2   

  1. 1. The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Hangzhou 310027, China
    2. Institute of Blockchain and Data Security, Hangzhou High-Tech Zone (Binjiang), Hangzhou 310052, China
  • Received:2025-08-27 Online:2026-02-10 Published:2026-02-23

Abstract:

Armv9 introduces the Arm Confidential Compute Architecture (Arm CCA), which protects confidential virtual machines from untrusted software and system environments by executing them in an isolated Realm world. The architectural design and software ecosystem development of CCA urgently require a simulation platform that supports both functional modeling and performance evaluation. However, existing studies either focus on functional virtualization of CCA without performance modeling capabilities, or provide performance simulation while lacking support for CCA mechanisms, making them inadequate for architectural exploration and performance analysis. To address this gap, this paper presented CCASim, a performance simulation platform with support for CCA functional modeling. CCASim provided a front-end/back-end decoupled simulation mode based on SniperSim and a full-system simulation mode based on Gem5, enabling configurable modeling of core CCA mechanisms and parallel simulation of multiple Realm virtual machines. Experimental results demonstrate that CCASim can correctly implement fine-grained memory protection and multi-VM isolation with only limited performance overhead, while ensuring functional correctness. Compared with existing solutions, the proposed platform offers clear advantages in simulation accuracy, flexibility, and performance evaluation capability, providing an effective tool for architectural research and software optimization of Arm CCA.

Key words: simulator, confidential computing, trusted execution environment, Arm confidential compute architecture, performance simulation analysis

CLC Number: