It appears you have not yet registered with our community. To register please click here...

 
Go Back [M] > Madshrimps > WebNews
AMD's Secure Encrypted Virtualisation is a little insecure AMD's Secure Encrypted Virtualisation is a little insecure
FAQ Members List Calendar Search Today's Posts Mark Forums Read


AMD's Secure Encrypted Virtualisation is a little insecure
Reply
 
Thread Tools
Old 16th August 2021, 09:07   #1
[M] Reviewer
 
Stefan Mileschin's Avatar
 
Join Date: May 2010
Location: Romania
Posts: 148,802
Stefan Mileschin Freshly Registered
Default AMD's Secure Encrypted Virtualisation is a little insecure

If you hit it with some electric shock therapy

AMD's Secure Encrypted Virtualisation (SEV) scheme may not be as secure as its claims according to a team of Berlin boffins.

The team at Technische Universität Berlin has devised an attack that defeats the system of protecting the data in virtual machines from rogue administrators in cloud environments.

In a paper with the Lord of the Ring’s inspired title "One Glitch to Rule Them All: Fault Injection Attacks Against AMD’s Secure Encrypted Virtualisation", Robert Buhren, Hans Niklas Jacob, Thilo Krachenfels, and Jean-Pierre Seifert from TU Berlin's Security in Telecommunications group, spill the beans on how they mounted a voltage fault injection attack.

This shocking method allowed them to recover secret encryption keys and execute arbitrary code on all AMD chips with Secure Processors (SP).

"By manipulating the input voltage to AMD systems on a chip (SoCs), we induce an error in the read-only memory (ROM) bootloader of the AMD-SP, allowing us to gain full control over this root-of-trust", the researchers explain in their paper.

The attack was inspired by a separate cunning plan, dubbed Voltpillager, used to defeat Intel's Software Guard Extensions (SGX), a similar secure enclave system for x86 microarchitecture.

To carry out the attack all they needed were off-the-shelf components including a $30 µController (microcontroller) and a $12 flash programmer. Non-material prerequisites pose more of a challenge – they include insider access at a cloud company, an opportunity to attach wires to the server motherboard without arousing suspicion, and some technical proficiency.

https://fudzilla.com/news/pc-hardwar...ittle-insecure
Stefan Mileschin is offline   Reply With Quote
Reply


Similar Threads
Thread Thread Starter Forum Replies Last Post
Apple’s sign-in insecure Stefan Mileschin WebNews 0 5th July 2019 14:59
Android most insecure OS of 2016 Stefan Mileschin WebNews 0 4th January 2017 19:47
Encrypted portable hard drives may not be as secure as you think Stefan Mileschin WebNews 0 23rd October 2015 06:52
Network virtualisation services to soar Stefan Mileschin WebNews 0 21st July 2015 06:26
Why does My Browser Say a Secure Website is not Fully Secure? Stefan Mileschin WebNews 0 9th July 2014 08:26
Oracle snubs Sun's virtualisation Stefan Mileschin WebNews 0 17th July 2013 20:06
Imation Launches Newest IronKey Hardware-Encrypted Secure Flash Drives Stefan Mileschin WebNews 0 9th November 2012 06:43
Parallels prepares XP virtualisation tool for Windows 7 jmke WebNews 0 6th May 2009 23:34
AMD releases Pacifica virtualisation spec Sidney WebNews 0 25th May 2005 15:14
IDF Fall 2004: Dual Core, Virtualisation and Power Saving Sidney WebNews 0 8th September 2004 20:00

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are Off
Pingbacks are Off
Refbacks are Off


All times are GMT +1. The time now is 11:20.


Powered by vBulletin® - Copyright ©2000 - 2024, Jelsoft Enterprises Ltd.
Content Relevant URLs by vBSEO