Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Netflix’s CTO says more vertical video experiments are coming, but the streamer won’t compete with TikTok

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves
Identity

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

userBy userOctober 28, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 28, 2025Ravi LakshmananEncryption/Hardware Security

A group of academic researchers from Georgia Tech, Purdue University, and Synchronix has developed a side-channel attack called TEE.Fail that can extract secrets from trusted execution environments (TEEs) on a computer’s main processor, such as Intel’s Software Guard eXtensions (SGX) and Trust Domain Extensions (TDX) and AMD’s Secure Encrypted Virtualization with Secure Nested Paging. (SEV-SNP) and ciphertext hiding.

The core of this attack involves the use of an intervention device built using off-the-shelf electronics that costs less than $1,000 and allows for physical inspection of all memory traffic within a DDR5 server.

“This makes it possible for the first time to extract cryptographic keys from Intel TDX and AMD SEV-SNPs with ciphertext hiding capabilities, including in some cases secret authentication keys from fully updated machines in a trusted state,” the researchers wrote on the information site.

DFIR retainer service

“In addition to subverting CPU-based TEEs, we also show how extracted authentication keys can be used to compromise Nvidia’s GPU Confidential Computing, allowing attackers to run AI workloads without TEE protection.”

This finding comes weeks after the release of two other TEE attacks, including Battering RAM and WireTap. Unlike these techniques, which target systems using DDR4 memory, TEE.Fail is the first proven attack against DDR5, meaning it can be used to undermine the latest hardware security protections from Intel and AMD.

A recent study found that the AES-XTS encryption mode used by Intel and AMD is not sufficient to prevent physical memory intervention attacks because it is deterministic. In a hypothetical attack scenario, an attacker could leverage custom equipment to record memory traffic flowing between the computer and DRAM, opening the door to side-channel attacks by observing the memory contents during read and write operations.

This could ultimately be exploited to extract data from sensitive virtual machines (CVMs), including ECDSA authentication keys from Intel’s Provisioning Certification Enclave (PCE), which are needed to break SGX and TDX certifications.

“Attestation is a mechanism used to prove that data and code are actually running inside a CVM, and therefore means that data and code can pretend to be running inside a CVM when in fact they are not,” the researchers said. “They can even read data and provide false output while faking a successfully completed authentication process.”

The study also pointed out that SEV-SNP with ciphertext hiding does not address the problem of deterministic encryption, nor does it prevent the intervention of a physical bus. As a result, this attack facilitates the extraction of private signing keys from OpenSSL’s ECDSA implementation.

CIS build kit

“Importantly, OpenSSL’s encryption code is fully punctual and ciphertext hiding was enabled on our machine, indicating that these features are not sufficient to mitigate bus intervention attacks,” they added.

Although there is no evidence that this attack has been used in the wild, researchers recommend using software countermeasures to reduce the risks posed as a result of deterministic encryption. However, it can be expensive.

Following this disclosure, AMD stated that it has no plans to provide any mitigations as physical vector attacks are not covered by AMD SEV-SNP. Intel noted in a similar warning that TEE.fail does not change the company’s previous out-of-bounds statements against this type of physical attack.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleNew Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human
Next Article Netflix’s CTO says more vertical video experiments are coming, but the streamer won’t compete with TikTok
user
  • Website

Related Posts

New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human

October 28, 2025

Researchers expose GhostCall and GhostHire: BlueNoroff’s new malware chain

October 28, 2025

Why early threat detection is essential for long-term business growth

October 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Netflix’s CTO says more vertical video experiments are coming, but the streamer won’t compete with TikTok

New TEE.Fail side-channel attack extracts secrets from Intel and AMD DDR5 secure enclaves

New Android Trojan ‘Herodotus’ Outwits Anti-Cheating Systems by Typing Like a Human

Researchers expose GhostCall and GhostHire: BlueNoroff’s new malware chain

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.