The Inner Circle

 View Only

CounterSEVeillance and TDXdown attacks analysis - October 18th working group meeting

  • 1.  CounterSEVeillance and TDXdown attacks analysis - October 18th working group meeting

    Posted Oct 17, 2024 04:00:00 PM

    Hey everyone,

    Mari has shared the following details on two new confidential computing related attacks against AMD and Intel trusted execution environments for analysis during the October 18th CAVEaT working group meeting. Since there isn't many real world examples of these type of attacks, this would be perfect for CAVEaT to provide guidance for Confidential Computing Threat to Model:

    CounterSEVeillance and TDXdown attacks: Two teams of academics have published details on two new attacks that can break the confidentiality of CPU trusted execution environments (TEEs). The attacks allow threat actors to recover sensitive data from sections of a CPU that have been designed to protect important data. The first attack is named CounterSEVeillance [PDF] and can recover data from AMD's Secure Encrypted Virtualization (SEV) TEE. The second attack is named TDXdown and impacts Intel's newest TEE technology, the Trust Domain Extensions (TDX). Both technologies are commonly used in cloud computing and virtual machine technologies. AMD has published guidance on how to deal with the attack, while Intel released firmware patches. [Additional coverage in SecurityWeek]

    Join Zoom Meeting - Friday, 10/18, 12 PM PT: 

    https://cloudsecurityalliance.zoom.us/j/85883295665

    Thanks,
    Alex



    ------------------------------
    Alex Kaluza
    Research Analyst
    Cloud Security Alliance
    ------------------------------