SGX defences breached again

@ 2022/08/10
Penetrated more times than Mae West

Intel's latest generation of CPUs are supposed to be a fortress for the safekeeping of encryption keys but contain a vulnerablity which allows attackers to obtain encryption keys and other confidential information.

Accroding to Ars Technica SGX should make life very difficult for hackers even when the operating system or a virtual machine running on top is maliciously compromised. SGX works by creating trusted execution environments that protect sensitive code and the data it works with from monitoring or tampering by anything else on the system.

SGX creates "enclaves," or blocks of secure memory. Enclave contents are encrypted before they leave the processor and are written in RAM. They are decrypted only after they return. The job of SGX is to safeguard the enclave memory and block access to its contents by anything other than the trusted part of the CPU.

No comments available.