December 10, 2025

Web and Technology News

Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks

In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can’t be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections—which work by storing certain data and processes inside encrypted enclaves known as TEEs (Trusted Execution Enclaves)—are essential for safeguarding secrets stored in the cloud by the likes of Signal Messenger and WhatsApp. All major cloud providers recommend that customers use it. Intel calls its protection SGX, and AMD has named it SEV-SNP.

Over the years, researchers have repeatedly broken the security and privacy promises that Intel and AMD have made about their respective protections. On Tuesday, researchers independently published two papers laying out separate attacks that further demonstrate the limitations of SGX and SEV-SNP. One attack, dubbed Battering RAM, defeats both protections and allows attackers to not only view encrypted data but also to actively manipulate it to introduce software backdoors or to corrupt data. A separate attack known as Wiretap is able to passively decrypt sensitive data protected by SGX and remain invisible at all times.

Attacking deterministic encryption

Both attacks use a small piece of hardware, known as an interposer, that sits between CPU silicon and the memory module. Its position allows the interposer to observe data as it passes from one to the other. They exploit both Intel’s and AMD’s use of deterministic encryption, which produces the same ciphertext each time the same plaintext is encrypted with a given key. In SGX and SEV-SNP, that means the same plaintext written to the same memory address always produces the same ciphertext.

Read full article

Comments

Previous Article

Verizon is giving away free Nintendo Switch consoles for Black Friday – how to qualify

Next Article

Anonymous question app Sendit deceived children and illegally collected their data, FTC alleges

You might be interested in …

Dashlane publishes its source code to GitHub in transparency push

Password management company Dashlane has made its mobile app code available on GitHub for public perusal, a first step it says in a broader push to make its platform more transparent. The Dashlane Android app code is available now alongside the iOS incarnation, though it also appears to include the codebase for its Apple Watch […]

Dashlane publishes its source code to GitHub in transparency push by Paul Sawers originally published on TechCrunch

Leave a Reply

Your email address will not be published. Required fields are marked *