InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Technology

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer

October 1, 2025 4 Min Read
Share
New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
SHARE

In yet another study, scholars from Georgia Tech and Purdue University demonstrated that security assurance provided by Intel’s Software Guard Extension (SGX) can be bypassed with DDR4 systems to passively decrypt sensitive data.

SGX is designed as a hardware feature of Intel server processors to enable applications to run in a trusted execution environment (TEE). It essentially separates trustworthy code and resources within what is called an enclave, preventing attackers from seeing their memory or CPU state.

In doing so, the mechanism ensures that data remains confidential, even if the underlying operating system has been tampered with or compromised by other means. However, the latest findings show the limits of SGX.

“We show how to build a device that can be cheaply and easily physically inspected all memory traffic in a computer in an environment with only basic electrical tools and equipment that can be easily purchased on the Internet,” the researchers said. “You can use an interposer device against the SGX proof mechanism to extract the SGX secret proof key from the machine with a fully reliable status and violate the SGX security.”

Like the abuse RAM attacks recently disclosed by Ku Leuven and researchers at the University of Birmingham, Codenayed Wiretap – a newly devised method, relies on interposers located between the CPU and memory modules to observe the data flowing between them. Interposers can be installed by threat actors through supply chain attacks or physical compromises.

The physical attack leverages the use of Intel’s deterministic encryption to perform a step-by-step full key recovery for Intel SGX Quotation Enclaves (QEs) allowing you to extract the ECDSA Signature Key that can be used to sign any SGX Enclave report.

See also  From quantum hacks to AI defense - an expert guide to building unbreakable cyber resilience

Put another way, attackers can weaponize the deterministic nature of memory encryption and construct some sort of oracle to break the security of the filming code for a certain period of time.

“We successfully extracted the proof key, the main mechanism used to determine whether the code is running under SGX,” the researchers said. “This allows hackers to pose as real SGX hardware, actually execute code and peer into data in an exposed way.”

“Like two aspects of the same coin, eavesdropping and gunfire rams see complementary properties of deterministic encryption. Wiresdropping mainly focuses on violations of confidentiality, while Battingrams focus primarily on integrity.

However, bombarding RAM is a low-cost attack that can be pulled apart using equipment under $50, while a eavesdropping setup with Logic Analyzer costs around $1,000.

Hypothetical attack scenarios targeting the deployment of SGX-backed blockchains such as Phala Network, Secret Network, Crust Network, and Integritee have been found to use eavesdropping to undermine confidentiality and integrity guarantees, allowing attackers to disclose confidential transactions and illegally obtain rewards for transactions.

In response to the findings, Intel stated that the exploit is out of scope of the threat model as it assumes physical enemies with direct access to hardware with memory bus interposers. Without “patches”, it is recommended that the server be used with a cloud provider that runs in a secure physical environment and provides independent physical security.

“An attack like this is outside the scope of the protection perimeter provided by the advanced encryption standard XEX-based fine-tuning codebook mode with Ciphertext Stailing (AES-XTS)-based memory encryption,” Chipmaker said. “Intel has no plans to issue CVEs as confidentiality protection is limited and integrity or replay prevention against physically capable attackers is not provided.”

See also  North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware
Share This Article
Twitter Copy Link
Previous Article Lost Ark is getting quality updates for life, but there's a nasty catch Lost Ark is getting quality updates for life, but there’s a nasty catch
Next Article Yemen's injury 2 missile attack on cargo ships and urges crews to abandon the ship Yemen’s injury 2 missile attack on cargo ships and urges crews to abandon the ship

Latest News

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025
North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

North Korean hackers deploy 197 npm packages to spread latest OtterCookie malware

The North Korean threat actors behind the Contagious Interview campaign…

November 29, 2025

You Might Also Like

Smishing Triad links to 194,000 malicious domains in global phishing operation
Technology

Smishing Triad links to 194,000 malicious domains in global phishing operation

5 Min Read
Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route
Technology

Two new Super Micro BMC bugs allow malicious firmware to circumvent the trust security route

4 Min Read
Five new exploited bugs listed in CISA catalog - Oracle and Microsoft also targeted
Technology

Five new exploited bugs listed in CISA catalog – Oracle and Microsoft also targeted

3 Min Read
New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions
Technology

New Fluent Bit flaw exposes cloud to RCE and stealth infrastructure intrusions

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?