New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

New Attack Targets DDR5 Memory to Steal Keys From Intel and AMD TEEs 

Researchers have revealed TEE.fail, a new physical attack method targeting DDR5 memory to compromise Intel and AMD’s trusted execution environments. This method can extract cryptographic and attestation keys, threatening confidential computing in data centers and cloud environments. #DDR5 #IntelTDX #AMDSEVSNP #ConfidentialComputing #GPUAttestation

Keypoints

  • TEE.fail is a physical attack that targets DDR5 memory modules.
  • The attack involves soldering an interposer between the CPU and memory to analyze bus traffic.
  • It allows extraction of cryptographic and attestation keys from Intel TDX and AMD SEV-SNP TEEs.
  • The attack can also compromise Nvidia’s GPU Confidential Computing by breaking attestation.
  • Both Intel and AMD consider these attacks outside their threat models, requiring physical access.

Read More: https://www.securityweek.com/new-attack-targets-ddr5-memory-to-steal-keys-from-intel-and-amd-tees/