← Back to Docs
Security Whitepaper
Technical architecture and threat model for hardware-isolated signing infrastructure.
Version 1.0•Last Updated: January 2026
Executive Summary
ZeroCopy Systems provides hardware-isolated signing infrastructure built on AWS Nitro Enclaves. Our architecture eliminates the need for trust in operators, administrators, or cloud providers by enforcing cryptographic isolation at the hardware level.
Core Security Properties
- ✓Hardware Isolation: Private keys exist only in encrypted enclave memory. No root access, no SSH, no debugging interfaces.
- ✓Cryptographic Attestation: Every request includes a PCR0 measurement proving the exact enclave code running.
- ✓Zero-Knowledge Architecture: ZeroCopy employees cannot access keys, even under subpoena.
- ✓Deterministic Builds: Reproducible enclave images allow independent verification of source code.
Threat Model
Assumptions
- • AWS Nitro Hypervisor is trusted (independently audited by NCC Group)
- • Client-side key generation is secure (user responsibility)
- • Network layer is adversarial (TLS + attestation required)
Mitigated Threats
- • Insider Attack: Operators cannot extract keys from enclave
- • Supply Chain: Deterministic builds prevent backdoored binaries
- • Memory Dump: Encrypted memory prevents cold boot attacks
- • Side Channel: Constant-time crypto + enclave isolation
Architecture Overview
The system consists of three layers:
- Client Layer: User-controlled application (trading bot, wallet, etc.)
- Sidecar Layer: Vsock proxy running on parent EC2 instance
- Enclave Layer: Nitro Enclave with signing logic and policy engine
Compliance
Our architecture is designed to meet the following regulatory requirements:
- • SEC 17a-4: Immutable audit logs with hash chaining
- • MiCA (EU): Operational resilience and key custody controls
- • SOC 2 Type II: In progress (Q2 2026)
Independent Verification
All claims in this whitepaper can be independently verified:
# Verify enclave measurement
zcp verify --pcr0 3a1f...9c2d
# Reproduce enclave build
git clone https://github.com/zerocopy-systems/sentinel-core
docker build -f EIF.Dockerfile -t sentinel:latest .Contact
For security inquiries or to report vulnerabilities, contact: security@zerocopy.systems
Was this page helpful?