Battering down the doors – this $50 hacking kit is enough to break Intel and AMD’s toughest chip defenses, so be on your guard

  • A $50 interposer can replay encrypted traffic and undermine enclave memory, experts claim
  • Intel SGX and AMD SEV-SNP both fall to replay manipulation
  • Hardware-level trade-offs favored scalability, leaving freshness and integrity unprotected

Academics from KU Leuven and the University of Birmingham have shown how a simple interposer can undermine the hardware protections of both Intel and AMD processors.

The teams built and tested a cheap interposer for under $50 that sits physically between a CPU and DDR4 memory modules.

They showed that with these inexpensive components, an attacker can observe, alias, and replay encrypted memory traffic to undermine trusted enclaves designed to protect sensitive data in the cloud.

Breaking deterministic encryption

The interposer is a small circuit placed on the memory signal path which contains analog switches controlled by a microcontroller.

By flipping those switches, the device can selectively reroute or ground address and command lines so two distinct physical addresses point to the same DRAM cells.

Because both SGX and SEV-SNP use deterministic memory encryption that depends on plaintext and address inputs, the same plaintext at the same address always produces the same ciphertext.

The attacker therefore captures the ciphertext at one observed address, and later forces the processor to read from an aliased address.

This causes the deterministic encryption to yield a valid decrypted plaintext that is stale or attacker-chosen.

This replay method enables arbitrary reads and writes into otherwise protected enclave memory on systems where the encryption key and address semantics permit such operations.

The researchers revealed two separate techniques, Battering RAM and Wiretap, which both exploit deterministic encryption used in trusted execution environments.

In the case of Battering RAM, the method works against both Intel and AMD processor protections.

The researchers say it, “exposes the fundamental limits of the scalable memory encryption designs currently used by Intel and AMD.”

“Battering RAM […] is capable of introducing memory aliases dynamically at runtime. As a result, Battering RAM can circumvent Intel’s and AMD’s boot-time alias checks.”

The related Wiretap technique takes a mapping approach that pairs observed ciphertext blocks to likely plaintext values, allowing for partial reconstruction of secrets used during cryptographic operations and eventual recovery of attestation keys.

Wiretap relies on building a ciphertext-to-known-plaintext dictionary for commonly occurring values inside algorithms such as ECDSA.

It then matches encrypted sequences against that dictionary until enough values are recovered to reconstruct keys.

While Wiretap is more equipment-intensive than the Battering RAM prototype, it demonstrates passive decryption threats that do not require active tampering.

Because both attacks target DDR4 signaling and rely on deterministic encryption, systems using DDR5 or TDX that avoid deterministic schemes are less vulnerable to these exact methods.

The researchers stressed the vulnerability stems from a deliberate engineering choice where determinism and scalability were prioritized over freshness and integrity.

Both Intel and AMD maintain their trusted enclaves are not designed to resist physical attacks, emphasizing their protections focus on software-level compromises, not on scenarios where attackers install hardware between the CPU and the memory.

However, the fact such attacks require only a cheap processor interposer raises questions about the practicality of excluding them from the threat model.

Fixing the issue likely requires hardware changes, such as adopting probabilistic encryption or adding integrity and freshness checks to memory encryption.

These approaches are harder to scale across large memory spaces, which explains why deterministic designs were chosen.

Until more resilient designs arrive, organizations using enclaves for sensitive tasks must recognize that their strongest defenses may fail against attackers with modest resources and physical access.

Via ArsTechnica

Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

You may also like

Read more @ TechRadar

Latest posts

Philips Evnia 49M2C8900 QD-OLED review: A strong highlight among the greatest super ultrawide monitors

Philips Evnia 49M2C8900 QD-OLED: Two-minute reviewPhilips Evnia 49M2C8900 QD-OLED ScorecardValueWhile the initial retail price would have knocked some points off here, the price drop...

How to watch New Zealand Kiwis vs Toa Samoa: free streams, TV channels for Pacific Cup 2025 Final

Stream New Zealand vs Samoa FREE on 9Now (Australia)Use NordVPN to watch from anywhereKick-Off: 12:05am ET / 5:05am BST / 3:05pm AESTThe New Zealand...

I’ve spent a month with the iPhone 17 Pro, and it’s confirmed my suspicions about Apple’s new iPhone lineup

In my role as TechRadar’s Phones Editor, I’m lucky enough to have access to many of the best phones as they hit the market,...

Could the AI bubble be real? This sage of the 2008 market crash and central character of The Big Short, certainly thinks so

Michael Burry’s latest positions intensify concerns about valuations across AI firmsNvidia and Palantir face scrutiny as investors react to Burry’s bearish stancePat Gelsinger’s comments...

Can’t think of a good password for every account? It’s not your fault – you can also blame the websites themselves, a new study...

Weak password rules engineer unsafe habits across major global websitesCritical industries still rely on outdated requirements while handling sensitive user dataAutomated attacks exploit insecure...

A portable 4K monitor at a low price sounds great, but having tested it, I can say the QQH Z12-4 isn’t perfect

QQH Z12-4 Portable Monitor: 30-second reviewI’m sure there is some odd backstory to why Chinese monitor makers like three-letter names, but I’ve no idea...

Like Spotify’s new Listening Stats upgrade? Here are 12 other great new features you may have missed this year

It's been a huge year for Spotify, and now all that's left is the forthcoming arrival of Spotify Wrapped 2025, but the platform is...

The best earbuds we’ve tested for 2025

It’s hard to buy a bad pair of wireless earbuds these days, and with constant discounts and deals wherever you look, now is as...

Steam store pages get a mini makeover to better suit wide screens

Store pages on Steam are looking a lot less cramped thanks to a new update. Pages have been made wider, with support for higher...

France vs South Africa free streams: How to watch Autumn International 2025, TV Channels, Team News & Preivew

Watch France vs South Africa free on TF1+ (France)Unlock your stream with NordVPN's Black Friday Deal (save 75%)France vs South Africa: Saturday, November 8...