Researchers have revealed TEE.fail, a new physical attack method targeting DDR5 memory to compromise Intel and AMD’s trusted execution environments. This method can extract cryptographic and attestation keys, threatening confidential computing in data centers and cloud environments. #DDR5 #IntelTDX #AMDSEVSNP #ConfidentialComputing #GPUAttestation
Keypoints
- TEE.fail is a physical attack that targets DDR5 memory modules.
- The attack involves soldering an interposer between the CPU and memory to analyze bus traffic.
- It allows extraction of cryptographic and attestation keys from Intel TDX and AMD SEV-SNP TEEs.
- The attack can also compromise Nvidia’s GPU Confidential Computing by breaking attestation.
- Both Intel and AMD consider these attacks outside their threat models, requiring physical access.
Read More: https://www.securityweek.com/new-attack-targets-ddr5-memory-to-steal-keys-from-intel-and-amd-tees/