Security News > 2017 > March > Using Intel's SGX to Attack Itself (Schneier on Security)

2017-03-16 10:54
Researchers have demonstrated using Intel's Software Guard Extensions to hide malware and steal cryptographic keys from inside SGX's protected enclave: Malware Guard Extension: Using SGX to Conceal Cache Attacks Abstract:In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants...
News URL
https://www.schneier.com/blog/archives/2017/03/using_intels_sg.html
Related news
- AI-Powered SaaS Security: Keeping Pace with an Expanding Attack Surface (source)
- New TCESB Malware Found in Active Attacks Exploiting ESET Security Scanner (source)
- Linux 'io_uring' security blindspot allows stealthy rootkit attacks (source)
- Ivanti patches two zero-days under active attack as intel agency warns customers (source)
- Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks (source)