Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers

EU launches €2.5 billion NanoIC semiconductor manufacturing facility

Development of rare earth free magnets for renewable energy and mobility

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer
Identity

New eavesdropping attack extracts Intel SGX ECDSA key via DDR4 memory bus interposer

userBy userOctober 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 1, 2025Ravi LakshmananEncryption/Hardware Security

In yet another study, scholars from Georgia Tech and Purdue University demonstrated that security assurance provided by Intel’s Software Guard Extension (SGX) can be bypassed with DDR4 systems to passively decrypt sensitive data.

SGX is designed as a hardware feature of Intel server processors to enable applications to run in a trusted execution environment (TEE). It essentially separates trustworthy code and resources within what is called an enclave, preventing attackers from seeing their memory or CPU state.

In doing so, the mechanism ensures that data remains confidential, even if the underlying operating system has been tampered with or compromised by other means. However, the latest findings show the limits of SGX.

“We show how to build a device that can be cheaply and easily physically inspected all memory traffic in a computer in an environment with only basic electrical tools and equipment that can be easily purchased on the Internet,” the researchers said. “You can use an interposer device against the SGX proof mechanism to extract the SGX secret proof key from the machine with a fully reliable status and violate the SGX security.”

Like the abuse RAM attacks recently disclosed by Ku Leuven and researchers at the University of Birmingham, Codenayed Wiretap – a newly devised method, relies on interposers located between the CPU and memory modules to observe the data flowing between them. Interposers can be installed by threat actors through supply chain attacks or physical compromises.

DFIR Retainer Service

The physical attack leverages the use of Intel’s deterministic encryption to perform a step-by-step full key recovery for Intel SGX Quotation Enclaves (QEs) allowing you to extract the ECDSA Signature Key that can be used to sign any SGX Enclave report.

Put another way, attackers can weaponize the deterministic nature of memory encryption and construct some sort of oracle to break the security of the filming code for a certain period of time.

“We successfully extracted the proof key, the main mechanism used to determine whether the code is running under SGX,” the researchers said. “This allows hackers to pose as real SGX hardware, actually execute code and peer into data in an exposed way.”

“Like two aspects of the same coin, eavesdropping and gunfire rams see complementary properties of deterministic encryption. Wiresdropping mainly focuses on violations of confidentiality, while Battingrams focus primarily on integrity.

However, bombarding RAM is a low-cost attack that can be pulled apart using equipment under $50, while a eavesdropping setup with Logic Analyzer costs around $1,000.

CIS Build Kit

Hypothetical attack scenarios targeting the deployment of SGX-backed blockchains such as Phala Network, Secret Network, Crust Network, and Integritee have been found to use eavesdropping to undermine confidentiality and integrity guarantees, allowing attackers to disclose confidential transactions and illegally obtain rewards for transactions.

In response to the findings, Intel stated that the exploit is out of scope of the threat model as it assumes physical enemies with direct access to hardware with memory bus interposers. Without “patches”, it is recommended that the server be used with a cloud provider that runs in a secure physical environment and provides independent physical security.

“An attack like this is outside the scope of the protection perimeter provided by the advanced encryption standard XEX-based fine-tuning codebook mode with Ciphertext Stailing (AES-XTS)-based memory encryption,” Chipmaker said. “Intel has no plans to issue CVEs as confidentiality protection is limited and integrity or replay prevention against physically capable attackers is not provided.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleWaymo can continue testing Robotaxis in New York until the end of 2025
Next Article The Beringland Bridge appeared much later than we thought, new research found
user
  • Website

Related Posts

Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers

February 10, 2026

Dutch authorities confirm Ivanti zero-day exploit exposed employee contact data

February 10, 2026

Fortinet patches critical SQLi flaw that allows unauthenticated code execution

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Warlock ransomware infiltrates SmarterTools through unpatched SmarterMail servers

EU launches €2.5 billion NanoIC semiconductor manufacturing facility

Development of rare earth free magnets for renewable energy and mobility

Dutch authorities confirm Ivanti zero-day exploit exposed employee contact data

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.