Extracting protected data from SGX enclaves

Extracting protected data from SGX enclaves

4 years ago
Anonymous $-9GJQVHNr8

https://www.bleepingcomputer.com/news/security/new-sgaxe-attack-steals-protected-data-from-intel-sgx-enclaves/

Intel processors are vulnerable to a new attack known as SGAxe that breaches the security guarantees of Intel Software Guard eXtensions (SGX) enclaves. It is designed to specifically target and leak data from Intel processors.

SGAxe is an evolution of the CacheOut attack (also known as L1D Eviction Sampling) previously disclosed by researchers at the University of Michigan, University of Adelaide, and Data61 in January 2020.

Extracting protected data from SGX enclaves

Jun 9, 2020, 5:35pm UTC
https://www.bleepingcomputer.com/news/security/new-sgaxe-attack-steals-protected-data-from-intel-sgx-enclaves/ > Intel processors are vulnerable to a new attack known as SGAxe that breaches the security guarantees of Intel Software Guard eXtensions (SGX) enclaves. It is designed to specifically target and leak data from Intel processors. > SGAxe is an evolution of the CacheOut attack (also known as L1D Eviction Sampling) previously disclosed by researchers at the University of Michigan, University of Adelaide, and Data61 in January 2020.