InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Technology

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer

October 1, 2025 4 Min Read
Share
New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
SHARE

In yet another study, scholars from Georgia Tech and Purdue University demonstrated that security assurance provided by Intel’s Software Guard Extension (SGX) can be bypassed with DDR4 systems to passively decrypt sensitive data.

SGX is designed as a hardware feature of Intel server processors to enable applications to run in a trusted execution environment (TEE). It essentially separates trustworthy code and resources within what is called an enclave, preventing attackers from seeing their memory or CPU state.

In doing so, the mechanism ensures that data remains confidential, even if the underlying operating system has been tampered with or compromised by other means. However, the latest findings show the limits of SGX.

“We show how to build a device that can be cheaply and easily physically inspected all memory traffic in a computer in an environment with only basic electrical tools and equipment that can be easily purchased on the Internet,” the researchers said. “You can use an interposer device against the SGX proof mechanism to extract the SGX secret proof key from the machine with a fully reliable status and violate the SGX security.”

Like the abuse RAM attacks recently disclosed by Ku Leuven and researchers at the University of Birmingham, Codenayed Wiretap – a newly devised method, relies on interposers located between the CPU and memory modules to observe the data flowing between them. Interposers can be installed by threat actors through supply chain attacks or physical compromises.

The physical attack leverages the use of Intel’s deterministic encryption to perform a step-by-step full key recovery for Intel SGX Quotation Enclaves (QEs) allowing you to extract the ECDSA Signature Key that can be used to sign any SGX Enclave report.

See also  Cisco Asa Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive

Put another way, attackers can weaponize the deterministic nature of memory encryption and construct some sort of oracle to break the security of the filming code for a certain period of time.

“We successfully extracted the proof key, the main mechanism used to determine whether the code is running under SGX,” the researchers said. “This allows hackers to pose as real SGX hardware, actually execute code and peer into data in an exposed way.”

“Like two aspects of the same coin, eavesdropping and gunfire rams see complementary properties of deterministic encryption. Wiresdropping mainly focuses on violations of confidentiality, while Battingrams focus primarily on integrity.

However, bombarding RAM is a low-cost attack that can be pulled apart using equipment under $50, while a eavesdropping setup with Logic Analyzer costs around $1,000.

Hypothetical attack scenarios targeting the deployment of SGX-backed blockchains such as Phala Network, Secret Network, Crust Network, and Integritee have been found to use eavesdropping to undermine confidentiality and integrity guarantees, allowing attackers to disclose confidential transactions and illegally obtain rewards for transactions.

In response to the findings, Intel stated that the exploit is out of scope of the threat model as it assumes physical enemies with direct access to hardware with memory bus interposers. Without “patches”, it is recommended that the server be used with a cloud provider that runs in a secure physical environment and provides independent physical security.

“An attack like this is outside the scope of the protection perimeter provided by the advanced encryption standard XEX-based fine-tuning codebook mode with Ciphertext Stailing (AES-XTS)-based memory encryption,” Chipmaker said. “Intel has no plans to issue CVEs as confidentiality protection is limited and integrity or replay prevention against physically capable attackers is not provided.”

See also  $50 batter ram attack breaks Intel and AMD cloud security protections
Share This Article
Twitter Copy Link
Previous Article Lost Ark is getting quality updates for life, but there's a nasty catch Lost Ark is getting quality updates for life, but there’s a nasty catch
Next Article Yemen's injury 2 missile attack on cargo ships and urges crews to abandon the ship Yemen’s injury 2 missile attack on cargo ships and urges crews to abandon the ship

Latest News

React2Shell critical flaw added to CISA KEV after active exploitation

React2Shell critical flaw added to CISA KEV after active exploitation

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday…

December 7, 2025
Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

Researchers discover more than 30 flaws in AI coding tools that enable data theft and RCE attacks

More than 30 security vulnerabilities have been uncovered in various…

December 6, 2025
Zero-click agent browser attack could delete entire Google Drive using crafted email

Zero-click agent browser attack could delete entire Google Drive using crafted email

New agent browser attack targeting Perplexity's Comet browser. A seemingly…

December 5, 2025
Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025

You Might Also Like

Evil malware is set in AI tools to infiltrate global organizations
Technology

Evil malware is set in AI tools to infiltrate global organizations

6 Min Read
North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware
Technology

North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware

6 Min Read
North Korean hacker lures defense engineer with fake job to steal drone secrets
Technology

North Korean hacker lures defense engineer with fake job to steal drone secrets

4 Min Read
The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China
Technology

The new report links research firms Bieta and CIII to MSS Cyber ​​Operations in China

4 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?