Close Menu
TechurzTechurz
    What's Hot

    OpenAI barrels towards IPO that may happen in September

    May 20, 2026

    Quartermaster is building a maritime hive mind

    May 20, 2026

    From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing

    May 19, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • OpenAI barrels towards IPO that may happen in September
    • Quartermaster is building a maritime hive mind
    • From teen hacker to Iron Dome researcher, this founder raised $28M to fight AI phishing
    • ‘Survivor’ stars Kyle Fraser and Kamilla Karthigesu introduce a goal-tracking app, Paprclip
    • Forget the feed: Status AI raises $17M to turn social media into interactive entertainment
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    TechurzTechurz
    • Home
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    • Tech Pulse
    TechurzTechurz
    Home - Cyber Reality - New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
    Cyber Reality

    New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer

    TechurzBy TechurzOctober 1, 2025Updated:May 10, 2026No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Oct 01, 2025Ravie LakshmananEncryption / Hardware Security

    In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intel’s Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data.

    SGX is designed as a hardware feature in Intel server processors that allows applications to be run in a Trusted Execution Environment (TEE). It essentially isolates trusted code and resources within what’s called enclaves, preventing attackers from viewing their memory or CPU state.

    In doing so, the mechanism ensures that the data stays confidential even when the underlying operating system has been tampered with or compromised by other means. However, the latest findings show the limitations of SGX.

    “We show how one can build a device to physically inspect all memory traffic inside a computer cheaply and easily, in environments with only basic electrical tools, and using equipment easily purchased on the internet,” the researchers said. “Using our interposer device against SGX’s attestation mechanism, we are able to extract an SGX secret attestation key from a machine in fully trusted status, thereby breaching SGX’s security.”

    Like the Battering RAM attack recently disclosed by KU Leuven and the University of Birmingham researchers, the newly devised method – codenamed WireTap – relies on an interposer that sits between the CPU and the memory module to observe the data that flows between them. The interposer can be installed by a threat actor either through a supply chain attack or physical compromise.

    At its core, the physical attack exploits Intel’s use of deterministic encryption to stage a full key recovery against Intel SGX’s Quoting Enclave (QE), effectively making it possible to extract an ECDSA signing key that can be used to sign arbitrary SGX enclave reports.

    Put differently, an attacker can weaponize the deterministic nature of memory encryption to build an oracle of sorts to break the security of constant-time cryptographic code.

    “We have successfully extracted attestation keys, which are the primary mechanism used to determine whether code is running under SGX,” the researchers said. “This allows any hacker to masquerade as genuine SGX hardware, while in fact running code in an exposed manner and peeking into your data.”

    “Like two sides of the same coin, WireTap and Battering RAM look at complementary properties of deterministic encryption. While WireTap focuses mainly on breaching confidentiality, BatteringRAM focuses mostly on integrity. The bottom line is the same; however, both SGX and SEV are easy to break using memory interposition.”

    However, while Battering RAM is a low-cost attack that can be pulled off using equipment costing less than $50, the WireTap setup costs about $1,000, including the logic analyzer.

    In a hypothetical attack scenario targeting SGX-backed blockchain deployments such as Phala Network, Secret Network, Crust Network, and IntegriTEE, the study found that WireTap can be leveraged to undermine confidentiality and integrity guarantees and allow attackers to disclose confidential transactions or illegitimately obtain transaction rewards.

    In response to the findings, Intel said the exploit is outside the scope of its threat model since it assumes a physical adversary that has direct access to the hardware with a memory bus interposer. In the absence of a “patch,” it’s recommended that the servers be run in secure physical environments and use cloud providers that provide independent physical security.

    “Such attacks are outside the scope of the boundary of protection offered by Advanced Encryption Standard-XEX-based Tweaked Codebook Mode with Ciphertext Stealing (AES-XTS) based memory encryption,” the chipmaker said. “As it provides limited confidentiality protection, and no integrity or anti-replay protection against attackers with physical capabilities, Intel does not plan to issue a CVE.”

    Attack DDR4 ECDSA Extracts Intel Interposer Key MemoryBus SGX WireTap
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleCreative machines and where AI meets imagination at Disrupt 2025
    Next Article Kevin Hart’s VC firm leads $35M Series B for weight-loss app Simple
    Techurz
    • Website

    Related Posts

    Opinion

    Intel spinout Articul8 raises more than half of $70M round at $500M valuation

    January 7, 2026
    Cyber Reality

    AI is becoming introspective – and that ‘should be monitored carefully,’ warns Anthropic

    November 3, 2025
    Cyber Reality

    Perplexity’s new AI tool lets you search patents with natural language – and it’s free

    November 3, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    College social app Fizz expands into grocery delivery

    September 3, 20252,288 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    The Reason Murderbot’s Tone Feels Off

    May 14, 202512 Views
    Stay In Touch
    • YouTube
    • WhatsApp
    • Twitter
    • Pinterest
    • LinkedIn
    Latest Reviews

    Techurz is a future-first technology publication covering AI systems, cyber reality, future tech, disruption, and digital signals — written today, searched tomorrow.

    Useful Links
    • Affiliate Disclosure
    • Terms and Conditions
    • Privacy Policy
    • Cookie Policy
    • Write For Us
    • About Us
    • Contact Us
    USEFUL LINKS
    • Our Authors / Editorial Team
    • Advertise
    • Disclaimer
    • DMCA
    • Editorial Policy
    • Sitemap

    Join the Techurz Brief

    The future does not arrive suddenly.
    Get sharp weekly signals on the technologies, risks, tools, and shifts that matter before they become obvious.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    © 2026 techurz. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.