Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Devil Wears Prada meets Ready or Not in the best thriller of May 2026

    May 15, 2026

    Titanic Irish Alt-Rock with Emotional Voltage

    May 15, 2026

    Big Chevy Silverados Discontinued. GM Ends Medium-Duty Pickup Production

    May 15, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks
    Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks
    Tech Reviews

    Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 1, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    AMD declined to comment on the record, and Intel didn’t respond to questions sent by email. In the past, both chipmakers have said that their respective TEEs are designed to protect against compromises of a piece of software or the operating system itself, including in the kernel. The guarantees, the companies have said, don’t extend to physical attacks such as Battering RAM and Wiretap, which rely on physical interposers that sit between the processor and the memory chips. Despite this limitation, many cloud-based services continue to trust assurances from the TEEs even when they have been compromised through physical attacks (more about that later).

    Intel on Tuesday published this advisory. AMD posted one here.

    Table of Contents

    Toggle
    • Battering RAM
      • Related posts:
    • World Cup 2026: Peacock Adds New Streaming Features for Spanish-Language Coverage
    • How to Get a Free PC Game Every Day From the Epic Games Store
    • Today's NYT Mini Crossword Answers for May 13

    Battering RAM

    Battering RAM uses a custom-built analog switch to act as an interposer that reads encrypted data as it passes between protected memory regions in DDR4 memory chips and an Intel or AMD processor. By design, both SGX and SEV-SNP make this ciphertext inaccessible to an adversary. To bypass that protection, the interposer creates memory aliases in which two different memory addresses point to the same location in the memory module.



    The Battering-RAM interposer, containing two analog switches (bottom center), is controlled by a microcontroller (left). The switches can dynamically either pass through the command signals to the connected DIMM or connect the respective lines to ground.

    Credit:
    De Meulemeester et al.

    The Battering-RAM interposer, containing two analog switches (bottom center), is controlled by a microcontroller (left). The switches can dynamically either pass through the command signals to the connected DIMM or connect the respective lines to ground.


    Credit:

    De Meulemeester et al.

    “This lets the attacker capture a victim’s ciphertext and later replay it from an alias,” De Meulemeester explained. “Because Intel’s and AMD’s memory encryption is deterministic, the replayed ciphertext always decrypts into valid plaintext when the victim reads it.” The PhD researcher at KU Leuven in Belgium continued:

    When the CPU writes data to memory, the memory controller encrypts it deterministically, using the plaintext and the address as inputs. The same plaintext written to the same address always produces the same ciphertext. Through the alias, the attacker can’t read the victim’s secrets directly, but they can capture the victim’s ciphertext. Later, by replaying this ciphertext at the same physical location, the victim will decrypt it to a valid, but stale, plaintext.

    This replay capability is the primitive on which both our SGX and SEV attacks are built.

    In both cases, the adversary installs the interposer, either through a supply-chain attack or physical compromise, and then runs either a virtual machine or application at a chosen memory location. At the same time, the adversary also uses the aliasing to capture the ciphertext. Later, the adversary replays the captured ciphertext, which, because it’s running in the region the attacker has access to, is then replayed as plaintext.

    Related posts:

    Wi-Fi 6 in 2026: Still As Solid and Relevant as Ever

    How to watch Royal Institution Christmas Lectures 2025 for FREE

    Today's NYT Wordle Hints, Answer and Help for April 12 #1758

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAI’s Impact on Modern C-suite Roles
    Next Article GPT-3: What is GPT-3 and what can it do for your business?
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Best Smoke Detectors and Dual Alarms for 2026: Lab Tested

    May 15, 2026
    Tech Reviews

    How to watch IIHF World Championship 2026: Free Live Streams & TV Channels

    May 15, 2026
    Tech Reviews

    Ubiquiti UniFi U7 Pro XG Wall Review: A Well-Performing Wall-Mount Wi-Fi 7 Access Point

    May 15, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025154 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202589 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202579 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    Black Swans in Artificial Intelligence — Dan Rose AI

    October 2, 2025154 Views

    Every Clue That Tony Stark Was Always Doctor Doom

    October 20, 202589 Views

    We let ChatGPT judge impossible superhero debates — here’s how it ruled

    December 31, 202579 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.