Undervolting allows attacks on Intel’s secure enclaves

Researchers at the University of Birmingham have identified a weakness in Intel's processors: by undervolting the CPU, Intel's secure enclave technology becomes vulnerable to attack. Modern processors are being pushed to perform faster than ever before - and with this comes increases in heat and power consumption. To manage this, many chip manufacturers allow frequency and voltage to be adjusted as and when needed - known as 'undervolting' or 'overvolting'. This is done through privileged software interfaces, such as a "model-specific register" in Intel Core processors. A team of researchers from the University of Birmingham's School of Computer Science along with researchers from imec-DistriNet (KU Leuven) and Graz University of Technology have been investigating how these interfaces can be exploited in Intel Core processors to undermine the system's security in a project called Plundervolt. New results, released today and accepted to IEEE Security & Privacy 2020 , show how the team was able to corrupt the integrity of Intel SGX on Intel Core processors by controlling the voltage when executing enclave computations - a method used to shield sensitive computations for example from malware. This means that even Intel SGX's memory encryption and authentication technology cannot protect against Plundervolt.
account creation

TO READ THIS ARTICLE, CREATE YOUR ACCOUNT

And extend your reading, free of charge and with no commitment.



Your Benefits

  • Access to all content
  • Receive newsmails for news and jobs
  • Post ads

myScience