URL has been copied successfully!
New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data.SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution

First seen on thehackernews.com

Jump to article: thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link