defense 2026

AgenTEE: Confidential LLM Agent Execution on Edge Devices

Sina Abdollahi 1, Mohammad M Maheri 1, Javad Forough 1, Amir Al Sadi 1, Josh Millar 1, David Kotz 2, Marios Kogias 1, Hamed Haddadi 1

0 citations

α

Published on arXiv

2604.18231

AI Supply Chain Attacks

OWASP ML Top 10 — ML06

Insecure Plugin Design

OWASP LLM Top 10 — LLM07

Excessive Agency

OWASP LLM Top 10 — LLM08

Key Finding

Achieves less than 5.15% runtime overhead compared to commodity OS multi-process deployments while providing strong isolation of model weights and system prompts

AgenTEE

Novel technique introduced


Large Language Model (LLM) agents provide powerful automation capabilities, but they also create a substantially broader attack surface than traditional applications due to their tight integration with non-deterministic models and third-party services. While current deployments primarily rely on cloud-hosted services, emerging designs increasingly execute agents directly on edge devices to reduce latency and enhance user privacy. However, securely hosting such complex agent pipelines on edge devices remains challenging. These deployments must protect proprietary assets (e.g., system prompts and model weights) and sensitive runtime state on heterogeneous platforms that are vulnerable to software attacks and potentially controlled by malicious users. To address these challenges, we present AgenTEE, a system for deploying confidential agent pipelines on edge devices. AgenTEE places the agent runtime, inference engine, and third-party applications into independently attested confidential virtual machines (cVMs) and mediates their interaction through explicit, verifiable communication channels. Built on Arm Confidential Compute Architecture (CCA), a recent extension to Arm platforms, AgenTEE enforces strong system-level isolation of sensitive assets and runtime state. Our evaluation shows that such multi-cVMs system is practical, achieving near-native performance with less than 5.15% runtime overhead compared to commodity OS multi-process deployments.


Key Contributions

  • Multi-cVM architecture isolating agent runtime, inference engine, and third-party tools with independent attestation
  • Implementation on Arm Confidential Compute Architecture (CCA) for edge device deployment
  • Explicit verifiable communication channels mediating interactions between isolated components

🛡️ Threat Analysis

AI Supply Chain Attacks

Protects the ML infrastructure and agent pipeline against compromise on edge devices - defends model weights, system prompts, and runtime state from software attacks and malicious device owners using hardware-based isolation.


Details

Domains
nlp
Model Types
llm
Threat Tags
inference_time
Applications
edge ai agentson-device llm deployment