{"id":144130,"date":"2025-09-30T20:25:08","date_gmt":"2025-09-30T20:25:08","guid":{"rendered":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/"},"modified":"2025-09-30T20:25:08","modified_gmt":"2025-09-30T20:25:08","slug":"intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks","status":"publish","type":"post","link":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/","title":{"rendered":"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks"},"content":{"rendered":"<div>\n<p>In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can\u2019t be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections\u2014which work by storing certain data and processes inside encrypted enclaves known as TEEs (<a href=\"https:\/\/duckduckgo.com\/?q=what+is+tee+sgx&amp;t=vivaldi&amp;atb=v481-1&amp;ia=web\">Trusted Execution Enclaves<\/a>)\u2014are essential for safeguarding secrets stored in the cloud by the likes of <a href=\"https:\/\/signal.org\/blog\/private-contact-discovery\/\">Signal Messenger<\/a> and <a href=\"https:\/\/ai.meta.com\/static-resource\/private-processing-technical-whitepaper\">WhatsApp<\/a>. All major cloud providers recommend that customers use it. Intel calls its protection <a href=\"https:\/\/en.wikipedia.org\/wiki\/Software_Guard_Extensions\">SGX<\/a>, and AMD has named it <a href=\"https:\/\/www.amd.com\/en\/developer\/sev.html\">SEV-SNP<\/a>.<\/p>\n<p>Over the years, researchers have repeatedly broken the security and privacy promises that Intel and AMD have made about their respective protections. On Tuesday, researchers independently published two papers laying out separate attacks that further demonstrate the limitations of SGX and SEV-SNP. One attack, dubbed Battering RAM, defeats both protections and allows attackers to not only view encrypted data but also to actively manipulate it to introduce software backdoors or to corrupt data. A separate attack known as Wiretap is able to passively decrypt sensitive data protected by SGX and remain invisible at all times.<\/p>\n<h2>Attacking deterministic encryption<\/h2>\n<p>Both attacks use a small piece of hardware, known as an interposer, that sits between CPU silicon and the memory module. Its position allows the interposer to observe data as it passes from one to the other. They exploit both Intel\u2019s and AMD\u2019s use of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Deterministic_encryption\">deterministic encryption<\/a>, which produces the same ciphertext each time the same plaintext is encrypted with a given key. In SGX and SEV-SNP, that means the same plaintext written to the same memory address always produces the same ciphertext.<\/p>\n<p><a href=\"https:\/\/arstechnica.com\/security\/2025\/09\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/\">Read full article<\/a><\/p>\n<p><a href=\"https:\/\/arstechnica.com\/security\/2025\/09\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/#comments\">Comments<\/a><\/p>\n<\/div>\n<p class=\"wpematico_credit\"><small>Powered by <a href=\"http:\/\/www.wpematico.com\" target=\"_blank\">WPeMatico<\/a><\/small><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can\u2019t be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections\u2014which work by storing certain data and processes inside encrypted enclaves known as TEEs (Trusted Execution Enclaves)\u2014are essential for safeguarding secrets stored in the cloud&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[241],"tags":[],"class_list":["post-144130","post","type-post","status-publish","format-standard","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - UshopWell.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - UshopWell.com\" \/>\n<meta property=\"og:description\" content=\"In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can\u2019t be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections\u2014which work by storing certain data and processes inside encrypted enclaves known as TEEs (Trusted Execution Enclaves)\u2014are essential for safeguarding secrets stored in the cloud...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"UshopWell.com\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-30T20:25:08+00:00\" \/>\n<meta name=\"author\" content=\"UShopWell\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"UShopWell\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/\"},\"author\":{\"name\":\"UShopWell\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\"},\"headline\":\"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks\",\"datePublished\":\"2025-09-30T20:25:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/\"},\"wordCount\":305,\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/\",\"name\":\"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - UshopWell.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\"},\"datePublished\":\"2025-09-30T20:25:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#website\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"name\":\"UshopWell.com\",\"description\":\"The Premiere Online Marketplace\",\"publisher\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#organization\",\"name\":\"UshopWell\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"contentUrl\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/wp-content\\\/uploads\\\/2018\\\/01\\\/pandaSwea.png\",\"width\":365,\"height\":359,\"caption\":\"UshopWell\"},\"image\":{\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/#\\\/schema\\\/person\\\/6fd1f9e0ff932e534c86c70d5acff0fc\",\"name\":\"UShopWell\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g\",\"caption\":\"UShopWell\"},\"url\":\"https:\\\/\\\/ushopwell.com\\\/ublog\\\/author\\\/kburnettu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - UshopWell.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - UshopWell.com","og_description":"In the age of cloud computing, protections baked into chips from Intel, AMD, and others are essential for ensuring confidential data and sensitive operations can\u2019t be viewed or manipulated by attackers who manage to compromise servers running inside a data center. In many cases, these protections\u2014which work by storing certain data and processes inside encrypted enclaves known as TEEs (Trusted Execution Enclaves)\u2014are essential for safeguarding secrets stored in the cloud...","og_url":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/","og_site_name":"UshopWell.com","article_published_time":"2025-09-30T20:25:08+00:00","author":"UShopWell","twitter_card":"summary_large_image","twitter_misc":{"Written by":"UShopWell","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/#article","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/"},"author":{"name":"UShopWell","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc"},"headline":"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks","datePublished":"2025-09-30T20:25:08+00:00","mainEntityOfPage":{"@id":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/"},"wordCount":305,"publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"articleSection":["Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/","url":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/","name":"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks - UshopWell.com","isPartOf":{"@id":"https:\/\/ushopwell.com\/ublog\/#website"},"datePublished":"2025-09-30T20:25:08+00:00","breadcrumb":{"@id":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ushopwell.com\/ublog\/intel-and-amd-trusted-enclaves-the-backbone-of-network-security-fall-to-physical-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ushopwell.com\/ublog\/"},{"@type":"ListItem","position":2,"name":"Intel and AMD trusted enclaves, the backbone of network security, fall to physical attacks"}]},{"@type":"WebSite","@id":"https:\/\/ushopwell.com\/ublog\/#website","url":"https:\/\/ushopwell.com\/ublog\/","name":"UshopWell.com","description":"The Premiere Online Marketplace","publisher":{"@id":"https:\/\/ushopwell.com\/ublog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ushopwell.com\/ublog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ushopwell.com\/ublog\/#organization","name":"UshopWell","url":"https:\/\/ushopwell.com\/ublog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/","url":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","contentUrl":"https:\/\/ushopwell.com\/ublog\/wp-content\/uploads\/2018\/01\/pandaSwea.png","width":365,"height":359,"caption":"UshopWell"},"image":{"@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ushopwell.com\/ublog\/#\/schema\/person\/6fd1f9e0ff932e534c86c70d5acff0fc","name":"UShopWell","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4adb372cadd43b4d4c57964dab95b0f69618bf960d131c4acf49d96d6bbc9c6e?s=96&d=mm&r=g","caption":"UShopWell"},"url":"https:\/\/ushopwell.com\/ublog\/author\/kburnettu\/"}]}},"_links":{"self":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/144130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/comments?post=144130"}],"version-history":[{"count":0,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/posts\/144130\/revisions"}],"wp:attachment":[{"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/media?parent=144130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/categories?post=144130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ushopwell.com\/ublog\/wp-json\/wp\/v2\/tags?post=144130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}