Hardware SE vs TEE

Technology vs Technology

Hardware SE is a dedicated tamper-resistant chip with EAL5+ certification, while TEE is an isolated processing environment on the main CPU with lower security assurance but no additional hardware cost.

Hardware Secure Element vs Trusted Execution Environment (TEE)

In the architecture of a mobile device or embedded system, two technologies compete to host sensitive security operations: the Hardware Secure Element (SE) and the Trusted Execution Environment (TEE). Both aim to isolate sensitive computation from the general-purpose application environment, but they do so through fundamentally different mechanisms — with significant implications for security certification, cost, and deployment flexibility.

Overview

Hardware Secure Element (SE) is a physically separate, tamper-resistant microcontroller with its own CPU, RAM, ROM, EEPROM, and cryptographic co-processors. It is certified to Common Criteria EAL4+ through EAL6+ (or equivalent), meaning it has been independently evaluated against explicit attack scenarios including physical probing, side-channel analysis, fault injection, and software exploitation. The SE communicates with the host processor over a controlled interface (SPI, I2C, ISO 7816, or SIM and NFC controller." data-category="Protocol">SWP for NFC). Its attack surface is intentionally minimal: there is no general-purpose OS, no network stack, and no user-mode application execution outside of tightly scoped applets.

Trusted Execution Environment (TEE) is a secure partition of the main application processor, created through hardware isolation mechanisms such as ARM TrustZone, Intel TXT, or RISC-V PMP. The TEE runs a small trusted OS (OP-TEE, Qualcomm QTEE, Apple Secure Enclave processor) in parallel with the Rich Execution Environment (REE — Android, iOS, Linux). Trusted Applications (TAs) run inside the TEE, isolated from the REE by hardware memory protection. However, both the TEE and REE share the same physical silicon, power rails, and many cache structures.

Key Differences

  • Physical isolation: SE is a discrete chip; TEE shares silicon with the main CPU
  • Attack surface: SE has minimal, hardware-bounded surface; TEE inherits some vulnerabilities from shared silicon (speculative execution side channels, shared cache attacks)
  • Certification: SE achieves CC EAL4+–EAL6+; TEE typically achieves EAL2–EAL4 at the platform level
  • Cost: SE requires additional chip BOM cost ($0.50–$5 depending on form factor); TEE is zero BOM cost (already in the SoC)
  • Flexibility: TEE allows rapid TA deployment without hardware changes; SE requires GP AES-based secure channel protocol." data-category="Software">SCP03-based applet loading
  • Payment scheme qualification: Visa, Mastercard, and EMV payment standards." data-category="Standard">EMVCo qualify dedicated SE for hardware payment credentials; TEE is accepted only for specific tokenized use cases

Technical Comparison

Parameter Hardware SE TEE
Physical isolation Discrete chip (discrete eSE, UICC, iSIM) Logical partition on main SoC
Security evaluation CC EAL4+ to EAL6+ (EMVCo, GlobalPlatform) CC EAL2–EAL4 (platform-level)
Side-channel resistance Hardware-hardened (DPA/SPA countermeasures built in) Limited (shares power, cache, thermal with REE)
Fault injection resistance Physically hardened (active mesh, voltage monitors) Minimal
Trusted OS JavaCard OS / MULTOS / proprietary OP-TEE, Qualcomm QTEE, Apple SEP
Applet/TA deployment GP SCP03 OTA or contact personalization Dynamic TA installation (vendor-controlled)
Interface to host SPI/I2C/SWP/ISO 7816 (narrow, controlled) In-SoC register interface (broader)
NFC integration Direct SWP link to NFC controller Requires REE+NFC stack co-operation
Payment scheme acceptance Fully qualified (Visa, MC, AmEx) Qualified for HCE tokenized only
BOM cost impact $0.50–$5 per device $0 (SoC feature)
Power independence Yes (own power domain) No (shared power with REE)

Security Boundary Analysis

The critical difference between an SE and a TEE is the strength of the security boundary. A Common Criteria EAL6+ SE evaluation requires the evaluator to demonstrate resistance to:

  • Differential Power Analysis (DPA): SE chips implement masking, randomized execution timing, and noise injection in hardware. TEE on a shared SoC cannot fully eliminate power side-channel leakage without platform-level countermeasures.
  • Fault injection: SE chips include voltage glitch detectors, light sensors (for decapping attacks), and active mesh layers. TEE has none of these.
  • Software exploits: SE runs a minimal applet runtime with no JIT compiler, no general network access, and no dynamic code loading without authenticated deployment. TEE trusted OS is more complex and has had real CVEs (e.g., multiple TrustZone vulnerabilities disclosed 2017–2023).

For payment credentials specifically, GlobalPlatform and EMVCo mandate hardware SE for any credential that generates EMV application cryptograms offline. TEE-based credentials must use tokenization (network tokens with limited scope and short expiry) precisely because the TEE cannot provide the same certification assurance.

Use Cases

Hardware SE is required for:

  • EMV payment credentials with offline authorization capability
  • ePassport and national eID chip (ICAO 9303 compliance)
  • PIV card and CAC (DoD) logical access with PKI
  • SIM/USIM subscriber authentication (UICC is itself a dedicated SE form factor)
  • High-assurance enterprise token (code signing, CA subordinate key storage)

TEE is appropriate for:

  • HCE tokenized payment (no offline authorization required)
  • DRM content key protection (Widevine L1 on Android)
  • Secure biometric matching (fingerprint template storage and match-on-device)
  • Enterprise MDM attestation and device health reporting
  • Moderately sensitive application secrets where EAL4+ certification is not required

When to Choose Each

Choose hardware SE when: - Payment scheme qualification requires it (all offline-capable EMV credentials) - Regulatory or certification frameworks mandate it (government eID, FIPS 140-3 Level 3+) - The threat model includes physical attackers with lab-grade equipment - The credential has a lifespan of years without re-issuance capability

Choose TEE when: - Cost sensitivity makes additional SE BOM cost prohibitive at scale - The security requirement is satisfied by EAL2–EAL4 assurance - Rapid TA iteration and remote update are priorities - The primary threat is software-based (malware, OS compromise) rather than physical

Conclusion

Hardware SE and TEE are complementary rather than competing technologies in modern device architectures. High-end smartphones increasingly include both: an eSE for payment credentials and the ARM TrustZone TEE for biometrics, DRM, and enterprise attestation. The choice is driven by the security evaluation level the use case demands, the payment scheme qualification requirements, and the BOM cost the product can absorb. For any use case touching regulated payment credentials or government identity, the hardware secure element remains the non-negotiable standard.

おすすめ

Hardware SE for highest security (payments, eID); TEE for cost-sensitive applications with moderate security needs.

よくある質問

A Hardware Secure Element (SE) is a dedicated, physically isolated chip with its own CPU, memory, and certified OS — completely separate from the main application processor. A Trusted Execution Environment (TEE), such as ARM TrustZone, is an isolated software partition inside the main SoC that provides a secure world but shares physical silicon with the rich OS. An SE offers stronger tamper resistance; a TEE offers lower cost and easier integration but a larger attack surface.

Choose a hardware SE for payment cards, identity credentials, eSIM, and anything requiring Common Criteria EAL4+ or FIPS 140-3 certification, as TEEs cannot achieve the same certified tamper resistance. TEEs are appropriate for DRM, secure boot, and application-layer attestation where cost constraints matter more than the highest physical security. Banking and government mandates almost always require a certified SE.

Yes — many smartphones combine ARM TrustZone (TEE) with an embedded SE or eUICC. The TEE handles high-frequency, lower-security operations like fingerprint template matching and DRM key derivation, while the SE manages payment credentials and SIM profiles. The two components communicate over a controlled interface, and the SE's certified security is not weakened by the TEE's presence.

GlobalPlatform publishes the TEE Client API (GP TEE-C) and TEE Internal Core API (GP TEE-I) for TEE application development, and the Secure Element API for host application access to SEs. Both specifications share the same organization's governance, enabling device vendors to expose a consistent programming model across security tiers and allowing application developers to target either environment with minimal changes.

Each comparison provides a side-by-side analysis covering interface type, chip architecture, security certification, communication protocol, application domains, and cost. Card-vs-card comparisons focus on specific products, while cross-technology comparisons evaluate broader categories like Contact vs Contactless or EMV vs MIFARE.