Security News > 2017 > March > Using Intel's SGX to Attack Itself (Schneier on Security)
2017-03-16 10:54
Researchers have demonstrated using Intel's Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX's protected enclave: Malware Guard Extension: Using SGX to Conceal Cache Attacks Abstract:In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants...
News URL
https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html
Related news
- Google Adds New Pixel Security Features to Block 2G Exploits and Baseband Attacks (source)
- WordPress LiteSpeed Cache Plugin Security Flaw Exposes Sites to XSS Attacks (source)
- EDRSilencer red team tool used in attacks to bypass security (source)
- China’s infosec leads accuse Intel of NSA backdoor, cite chip security flaws (source)
- Tesla, Intel, deny they're the foreign company China just accused of making maps that threaten national security (source)
- ISC2 Security Congress 2024: The Landscape of Nation-State Cyber Attacks (source)
- Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar (source)
- T-Mobile US 'monitoring' China's 'industry-wide attack' amid fresh security breach fears (source)
- Apple fixes two zero-days used in attacks on Intel-based Macs (source)