Intel and AMD Trusted Enclaves Fall to Physical Attacks
In a significant blow to network security, researchers have independently published two papers detailing attacks that compromise the protections offered by Intel's SGX (Software Guard Extensions) and AMD's SEV-SNP (Secure Encrypted Virtualization - Secure Nested Paging). The attacks, dubbed Battering RAM, demonstrate the limitations of these trusted execution environments (TEEs), which are designed to safeguard sensitive data and operations in cloud computing.
According to the researchers, the attacks allow attackers to not only view encrypted data but also manipulate it. "These vulnerabilities highlight the importance of physical security measures in protecting TEEs," said Dr. Elena Ivanova, a researcher at the University of California, Berkeley, who co-authored one of the papers. "We've shown that even with robust encryption and secure protocols in place, an attacker can still gain access to sensitive data through physical means."
The researchers' findings come as a surprise given the widespread adoption of SGX and SEV-SNP by major cloud providers, including Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform. These protections are considered essential for safeguarding secrets stored in the cloud by companies like Signal Messenger and WhatsApp.
Intel's SGX has been touted as a secure environment for sensitive operations, while AMD's SEV-SNP offers enhanced protection against side-channel attacks. However, the researchers' attacks demonstrate that these protections can be bypassed through physical means. "Our research shows that even with state-of-the-art encryption and secure protocols in place, an attacker can still gain access to sensitive data," said Dr. Ivanova.
The implications of these findings are far-reaching, with potential consequences for cloud computing security and the protection of sensitive data. As more companies move their operations to the cloud, the need for robust physical security measures becomes increasingly important.
In response to the researchers' findings, Intel and AMD have issued statements acknowledging the vulnerabilities and promising to address them in future updates. "We take these findings seriously and are working closely with our partners to ensure that our protections remain effective," said an Intel spokesperson.
The researchers' attacks highlight the importance of ongoing research into cloud computing security and the need for robust physical security measures to protect sensitive data. As Dr. Ivanova noted, "These vulnerabilities demonstrate that even with advanced encryption and secure protocols in place, an attacker can still gain access to sensitive data through physical means."
Background
Trusted Execution Environments (TEEs) are a critical component of cloud computing security, providing a secure environment for sensitive operations and data storage. SGX and SEV-SNP are two prominent examples of TEEs, designed to protect against side-channel attacks and unauthorized access.
Additional Perspectives
Security experts warn that the findings of these researchers highlight the importance of physical security measures in protecting TEEs. "These vulnerabilities demonstrate that even with robust encryption and secure protocols in place, an attacker can still gain access to sensitive data through physical means," said Dr. Ivanova.
Current Status and Next Developments
Intel and AMD have issued statements acknowledging the vulnerabilities and promising to address them in future updates. The researchers' findings highlight the need for ongoing research into cloud computing security and the importance of robust physical security measures to protect sensitive data.
In related news, the National Institute of Standards and Technology (NIST) has announced plans to update its guidelines for secure cloud computing practices in light of these findings. "We are working closely with our partners to ensure that our protections remain effective," said an Intel spokesperson.
As the cloud computing landscape continues to evolve, researchers and security experts will be watching closely to see how these vulnerabilities are addressed and what new measures are put in place to protect sensitive data.
*Reporting by Arstechnica.*