Researchers independently published two papers disclosing physical attacks Battering RAM and Wiretap against Intel SGX and AMD SEV-SNP, exploiting deterministic encryption vulnerabilities, allowing attackers to view and manipulate protected data. 研究人员独立发布两篇论文,披露针对Intel SGX和AMD SEV-SNP的物理攻击Battering RAM和Wiretap,利用确定性加密漏洞,允许攻击者查看和操纵受保护数据。
Notes
TEE depends on deterministic encryption, vulnerable to replay attacks, requiring hardware changes to enhance security
Battering RAM attack costs less than $50, supporting active data read and write
Wiretap attack costs $500-1000, supporting passive data read only
Attacks through physical interceptors, supply chain or physical access can lead to vulnerability exploitation
Chip manufacturers claim TEE design does not defend against physical attacks, but cloud services still widely rely on it
Blockchain services like Phala use TEE to protect smart contracts, facing potential security risks