Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
Security AMD Intel Privacy

Intel and AMD Trusted Enclaves, a Foundation For Network Security, Fall To Physical Attacks (arstechnica.com) 20

Researchers have unveiled two new hardware-based attacks, Battering RAM and Wiretap, that break Intel SGX and AMD SEV-SNP trusted enclaves by exploiting deterministic encryption and physical interposers. Ars Technica reports: In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can't be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections -- which work by storing certain data and processes inside encrypted enclaves known as TEEs (Trusted Execution Enclaves) -- are essential for safeguarding secrets stored in the cloud by the likes of Signal Messenger and WhatsApp. All major cloud providers recommend that customers use it. Intel calls its protection SGX, and AMD has named it SEV-SNP.

Over the years, researchers have repeatedly broken the security and privacy promises that Intel and AMD have made about their respective protections. On Tuesday, researchers independently published two papers laying out separate attacks that further demonstrate the limitations of SGX and SEV-SNP. One attack, dubbed Battering RAM, defeats both protections and allows attackers to not only view encrypted data but also to actively manipulate it to introduce software backdoors or to corrupt data. A separate attack known as Wiretap is able to passively decrypt sensitive data protected by SGX and remain invisible at all times.

Intel and AMD Trusted Enclaves, a Foundation For Network Security, Fall To Physical Attacks

Comments Filter:
  • by BoogieChile ( 517082 ) on Wednesday October 01, 2025 @09:58PM (#65697032)
    World reels in shock and amazement. More at 11.
    • Guarding Against Physical Attacks: The Xbox One Story [platformse...summit.com] was written in 2019.

      I don't know if the Xbox has been compromised since then, but if it has been, it wasn't easy.

      • The XBox is impressive, but it uses a physical ring of defenses. CPU makers don't have that much room.

        At most, they can put a capsule of a potent acid, so decapping causes it to physically dissolve the secure area.

        Instead, maybe some work should be done on PUFs. This way, the chip doesn't have to contain any secure data. It just uses its unclonable encrypt/decrypt operation to deal with stuff. A name:value lookup for passwords could be infinite because it wouldn't need to be stored in an enclave.

  • This will actually make it easier for security companies to analyze malware that uses SGX and SEV.

    Frankly, I find these to be misfeatures as the people who actually want these are slinging DRM.

    • Frankly, I find these to be misfeatures as the people who actually want these are slinging DRM.

      Or you know, protecting encryption keys from computer-nabbed-by-the-FBI style attacks.

      Not that I perceive a large uhhh, demand for that... I can definitely think of at least 1 person sitting in jail who really wishes he had SGX on his machine.

    • Right, for most of us this probably isn't particularly relevant. But, if you're employed by a cloud vendor possessing contracts with a national government... then maybe you do need to think about this.

      • It can affect us directly. The Secure Enclave on a phone can be all that keeps data away from the hands of bad guys on a stolen phone. The TPM might be the only thing that keeps company data out of the hands of nation-state tier level thieves. Yes, it sounds like overkill, but might as well do it right, because you never know.

  • Dredge in flour, then beaten eggs, then dried bread crumbs, preferably Panko. Deep-fry until golden brown.

  • Just because you have a "security enclave" doesn't mean it has anything to do with security for user data. In virtually all cases we've seen in reality so far, this kind of technology is used for securing business models against the interests of the users. Effectively they facilitate attacks against the user rather than hinder them. The most prominent example, of course, is DRM.

    So please skip the nonsense. In the rare event you actually need some sort of hardware security, get a hardware security module.

  • >"In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can't be viewed or manipulated by attackers who manage to compromise servers running inside a data center."

    These are PHYSICAL attacks that require getting physically to the server (keys/locks/cameras/security guards/alarms), taking the server power down (service loss/downtime alerts/network monitoring), removing it from the rack, opening it, insta

    • by flux ( 5274 )

      It could happen rather easily: e.g. the government could compel a datacenter to provide access to a rack server of its customer. Or a datacenter worker could be bribed to do it. Power outage can be explained by a power distribution malfunction.

      E.g. Signal uses Azure and SGX is a component of their security, for dealing with things like contact discovery. But surely nobody would be interested in compromising Signal..

      You're probably need to be quite a high-value target be attacked this way.

  • Why has no-one made a computer (or if they have, why is it not more widely known or used) that works like, say, the Xbox One and Xbox Series where the CPU has a unique (and unreadable by any software) key burnt into it at manufacture time and any access to RAM is encrypted using that key and some hardware encryption.

    Done right, it would be impossible for any attacks that rely on reading or writing the contents of RAM other than through the CPU memory controller (and the encryption hardware) to even work.

    May

    • by dargaud ( 518470 )
      The word you are looking for is homomorphic encryption [wikipedia.org]. Encrypt your data locally, encrypt your program, transfer both to 'the cloud', execute the encrypted program there to produce encrypted results, transfer those back, decrypt them locally and you have your results and 'the cloud' can't know shit about it. It's the holy grail of computing.
  • Both attacks use a small piece of hardware, known as an interposer, that sits between CPU silicon and the memory module.

    Yeah, I got bad news, if someone is able to get access to your hardware for long enough to install an interposer AND get it to work (the signal integrity engineering at modern RAM speeds borders on magic, and an interposer throws God* only knows how many nanohenries of mutual inductance wrenches into the machinery), they've got time to do a LOT of things.

    *and by God I mean the milli

Cobol programmers are down in the dumps.

Working...