Replay attacks break Intel and AMD enclave protections

Replay attacks break Intel and AMD enclave protections

Replay attacks break Intel and AMD enclave protections


  • A $50 interposer can replay encrypted traffic and undermine enclave memory, experts claim
  • Intel SGX and AMD SEV-SNP both fall to replay manipulation
  • Hardware-level trade-offs favored scalability, leaving freshness and integrity unprotected

Academics from KU Leuven and the University of Birmingham have shown how a simple interposer can undermine the hardware protections of both Intel and AMD processors.

The teams built and tested a cheap interposer for under $50 that sits physically between a CPU and DDR4 memory modules.





Source link

Back To Top