Close Menu
TechUpdateAlert

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025
    Facebook X (Twitter) Instagram
    Trending
    • My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why
    • You can now buy the OnePlus 15 in the US and score free earbuds if you hurry
    • Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455
    • Android might finally stop making you tap twice for Wi-Fi
    • Today’s NYT Mini Crossword Answers for Dec. 22
    • Waymo’s robotaxis didn’t know what to do when a city’s traffic lights failed
    • Today’s NYT Wordle Hints, Answer and Help for Dec. 22 #1647
    • You Asked: OLED Sunlight, VHS on 4K TVs, and HDMI Control Issues
    Facebook X (Twitter) Instagram Pinterest Vimeo
    TechUpdateAlertTechUpdateAlert
    • Home
    • Gaming
    • Laptops
    • Mobile
    • Software
    • Reviews
    • AI & Tech
    • Gadgets
    • How-To
    TechUpdateAlert
    Home»How-To»Cheap $50 hack shows Intel and AMD security walls crumble as researchers bypass chip defenses using simple memory interposer trick
    How-To

    Cheap $50 hack shows Intel and AMD security walls crumble as researchers bypass chip defenses using simple memory interposer trick

    techupdateadminBy techupdateadminOctober 6, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    A laptop with digitally inserted hack warnings around it
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • A $50 interposer can replay encrypted traffic and undermine enclave memory, experts claim
    • Intel SGX and AMD SEV-SNP both fall to replay manipulation
    • Hardware-level trade-offs favored scalability, leaving freshness and integrity unprotected

    Academics from KU Leuven and the University of Birmingham have shown how a simple interposer can undermine the hardware protections of both Intel and AMD processors.

    The teams built and tested a cheap interposer for under $50 that sits physically between a CPU and DDR4 memory modules.

    They showed that with these inexpensive components, an attacker can observe, alias, and replay encrypted memory traffic to undermine trusted enclaves designed to protect sensitive data in the cloud.


    You may like

    Breaking deterministic encryption

    The interposer is a small circuit placed on the memory signal path which contains analog switches controlled by a microcontroller.

    By flipping those switches, the device can selectively reroute or ground address and command lines so two distinct physical addresses point to the same DRAM cells.

    Because both SGX and SEV-SNP use deterministic memory encryption that depends on plaintext and address inputs, the same plaintext at the same address always produces the same ciphertext.

    The attacker therefore captures the ciphertext at one observed address, and later forces the processor to read from an aliased address.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    This causes the deterministic encryption to yield a valid decrypted plaintext that is stale or attacker-chosen.

    This replay method enables arbitrary reads and writes into otherwise protected enclave memory on systems where the encryption key and address semantics permit such operations.

    The researchers revealed two separate techniques, Battering RAM and Wiretap, which both exploit deterministic encryption used in trusted execution environments.


    You may like

    In the case of Battering RAM, the method works against both Intel and AMD processor protections.

    The researchers say it, “exposes the fundamental limits of the scalable memory encryption designs currently used by Intel and AMD.”

    “Battering RAM […] is capable of introducing memory aliases dynamically at runtime. As a result, Battering RAM can circumvent Intel’s and AMD’s boot-time alias checks.”

    The related Wiretap technique takes a mapping approach that pairs observed ciphertext blocks to likely plaintext values, allowing for partial reconstruction of secrets used during cryptographic operations and eventual recovery of attestation keys.

    Wiretap relies on building a ciphertext-to-known-plaintext dictionary for commonly occurring values inside algorithms such as ECDSA.

    It then matches encrypted sequences against that dictionary until enough values are recovered to reconstruct keys.

    While Wiretap is more equipment-intensive than the Battering RAM prototype, it demonstrates passive decryption threats that do not require active tampering.

    Because both attacks target DDR4 signaling and rely on deterministic encryption, systems using DDR5 or TDX that avoid deterministic schemes are less vulnerable to these exact methods.

    The researchers stressed the vulnerability stems from a deliberate engineering choice where determinism and scalability were prioritized over freshness and integrity.

    Both Intel and AMD maintain their trusted enclaves are not designed to resist physical attacks, emphasizing their protections focus on software-level compromises, not on scenarios where attackers install hardware between the CPU and the memory.

    However, the fact such attacks require only a cheap processor interposer raises questions about the practicality of excluding them from the threat model.

    Fixing the issue likely requires hardware changes, such as adopting probabilistic encryption or adding integrity and freshness checks to memory encryption.

    These approaches are harder to scale across large memory spaces, which explains why deterministic designs were chosen.

    Until more resilient designs arrive, organizations using enclaves for sensitive tasks must recognize that their strongest defenses may fail against attackers with modest resources and physical access.

    Via ArsTechnica

    Follow TechRadar on Google News and add us as a preferred source to get our expert news, reviews, and opinion in your feeds. Make sure to click the Follow button!

    And of course you can also follow TechRadar on TikTok for news, reviews, unboxings in video form, and get regular updates from us on WhatsApp too.

    You may also like

    AMD Bypass cheap Chip crumble defenses Hack Intel interposer memory Researchers security Shows simple trick walls
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleStill waiting on Microsoft to fix File Explorer? This app already did
    Next Article Metal: Hellsinger studio The Outsiders is closing as part of Funcom’s post-Dune: Awakening layoffs
    techupdateadmin
    • Website

    Related Posts

    Gadgets

    Your next prebuilt PC might arrive with memory loss

    December 21, 2025
    Mobile

    Samsung announces Exynos 2600, the world’s first 2nm mobile chip

    December 19, 2025
    Gadgets

    Rising memory costs could impact your next Android smartphone’s price and performance

    December 15, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    NYT Strands hints and answers for Monday, August 11 (game #526)

    August 11, 202545 Views

    These 2 Cities Are Pushing Back on Data Centers. Here’s What They’re Worried About

    September 13, 202542 Views

    Today’s NYT Connections: Sports Edition Hints, Answers for Sept. 4 #346

    September 4, 202540 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Best Fitbit fitness trackers and watches in 2025

    July 9, 20250 Views

    There are still 200+ Prime Day 2025 deals you can get

    July 9, 20250 Views

    The best earbuds we’ve tested for 2025

    July 9, 20250 Views
    Our Picks

    My Health Anxiety Means I Won’t Use Apple’s or Samsung’s Smartwatches. Here’s Why

    December 22, 2025

    You can now buy the OnePlus 15 in the US and score free earbuds if you hurry

    December 22, 2025

    Today’s NYT Connections: Sports Edition Hints, Answers for Dec. 22 #455

    December 22, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact us
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    © 2026 techupdatealert. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.