Hasty Briefsbeta

  • #Encryption
  • #Cloud Security
  • #Hardware Vulnerabilities
  • Cloud computing relies on chip protections from Intel (SGX) and AMD (SEV-SNP) to secure confidential data via encrypted enclaves (TEEs).
  • Recent attacks (Battering RAM and Wiretap) exploit vulnerabilities in SGX and SEV-SNP, allowing data decryption and manipulation.
  • Attacks use an interposer hardware to intercept data between CPU and memory, exploiting deterministic encryption weaknesses.
  • Deterministic encryption in SGX and SEV-SNP produces identical ciphertext for the same plaintext, making it vulnerable.
  • Physical attacks via interposers are less scalable but pose risks for highly sensitive data in untrusted environments.
  • Threat models vary; some prioritize digital attacks (rogue admins) over unreliable physical breaches.