Close Menu

    Subscribe to Updates

    Get the latest news from tastytech.

    What's Hot

    Romeo is a Dead Man Review: More Lynchian lunacy from one of gaming’s most uncompromising studios

    February 10, 2026

    ‘Friday the 13th’ Movies Returning to Theaters on Friday the 13th

    February 10, 2026

    2026 BYD Sealion 8 Dynamic FWD review

    February 10, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    tastytech.intastytech.in
    Subscribe
    • AI News & Trends
    • Tech News
    • AI Tools
    • Business & Startups
    • Guides & Tutorials
    • Tech Reviews
    • Automobiles
    • Gaming
    • movies
    tastytech.intastytech.in
    Home»Tech Reviews»Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks
    Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks
    Tech Reviews

    Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks

    gvfx00@gmail.comBy gvfx00@gmail.comOctober 1, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    AMD declined to comment on the record, and Intel didn’t respond to questions sent by email. In the past, both chipmakers have said that their respective TEEs are designed to protect against compromises of a piece of software or the operating system itself, including in the kernel. The guarantees, the companies have said, don’t extend to physical attacks such as Battering RAM and Wiretap, which rely on physical interposers that sit between the processor and the memory chips. Despite this limitation, many cloud-based services continue to trust assurances from the TEEs even when they have been compromised through physical attacks (more about that later).

    Intel on Tuesday published this advisory. AMD posted one here.

    Table of Contents

    Toggle
    • Battering RAM
      • Related posts:
    • 'Toy Story 5' Trailer Teases Terrifying Toy Battle: Woody and Buzz vs. a Tablet
    • Trump Fails to Deliver on Promise of $500 Gold Phone in 2025. Could We See It Next Year?
    • How to watch the 2025 MLB World Series without cable

    Battering RAM

    Battering RAM uses a custom-built analog switch to act as an interposer that reads encrypted data as it passes between protected memory regions in DDR4 memory chips and an Intel or AMD processor. By design, both SGX and SEV-SNP make this ciphertext inaccessible to an adversary. To bypass that protection, the interposer creates memory aliases in which two different memory addresses point to the same location in the memory module.



    The Battering-RAM interposer, containing two analog switches (bottom center), is controlled by a microcontroller (left). The switches can dynamically either pass through the command signals to the connected DIMM or connect the respective lines to ground.

    Credit:
    De Meulemeester et al.

    The Battering-RAM interposer, containing two analog switches (bottom center), is controlled by a microcontroller (left). The switches can dynamically either pass through the command signals to the connected DIMM or connect the respective lines to ground.


    Credit:

    De Meulemeester et al.

    “This lets the attacker capture a victim’s ciphertext and later replay it from an alias,” De Meulemeester explained. “Because Intel’s and AMD’s memory encryption is deterministic, the replayed ciphertext always decrypts into valid plaintext when the victim reads it.” The PhD researcher at KU Leuven in Belgium continued:

    When the CPU writes data to memory, the memory controller encrypts it deterministically, using the plaintext and the address as inputs. The same plaintext written to the same address always produces the same ciphertext. Through the alias, the attacker can’t read the victim’s secrets directly, but they can capture the victim’s ciphertext. Later, by replaying this ciphertext at the same physical location, the victim will decrypt it to a valid, but stale, plaintext.

    This replay capability is the primitive on which both our SGX and SEV attacks are built.

    In both cases, the adversary installs the interposer, either through a supply-chain attack or physical compromise, and then runs either a virtual machine or application at a chosen memory location. At the same time, the adversary also uses the aliasing to capture the ciphertext. Later, the adversary replays the captured ciphertext, which, because it’s running in the region the attacker has access to, is then replayed as plaintext.

    Related posts:

    The first permanent Pokémon theme park opens in February 2026

    Non-Wi-Fi Routers: The Top 5 Best Picks

    US bans new foreign-made drones and components

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleAI’s Impact on Modern C-suite Roles
    Next Article GPT-3: What is GPT-3 and what can it do for your business?
    gvfx00@gmail.com
    • Website

    Related Posts

    Tech Reviews

    Framework Desktop Review: Small and Mighty, but Shy of Upgrade Greatness

    February 10, 2026
    Tech Reviews

    How to watch The Artful Dodger season 2 online from anywhere

    February 10, 2026
    Tech Reviews

    TP-Link Deco 101: Everything You Need to Know about the Popular Mesh Brand

    February 10, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram

    Subscribe to Updates

    Get the latest tech news from tastytech.

    About Us
    About Us

    TastyTech.in brings you the latest AI, tech news, cybersecurity tips, and gadget insights all in one place. Stay informed, stay secure, and stay ahead with us!

    Most Popular

    BMW Will Put eFuel In Cars Made In Germany From 2028

    October 14, 202511 Views

    Best Sonic Lego Deals – Dr. Eggman’s Drillster Gets Big Price Cut

    December 16, 20259 Views

    What is Fine-Tuning? Your Ultimate Guide to Tailoring AI Models in 2025

    October 14, 20259 Views

    Subscribe to Updates

    Get the latest news from tastytech.

    Facebook X (Twitter) Instagram Pinterest
    • Homepage
    • About Us
    • Contact Us
    • Privacy Policy
    © 2026 TastyTech. Designed by TastyTech.

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.