all InfoSec news
SEV-Step: A Single-Stepping Framework for AMD-SEV. (arXiv:2307.14757v1 [cs.CR])
cs.CR updates on arXiv.org arxiv.org
The ever increasing popularity and availability of Trusted Execution
Environments (TEEs) had a stark influence on microarchitectural attack research
in academia, as their strong attacker model both boosts existing attack vectors
and introduces several new ones. While many works have focused on Intel SGX,
other TEEs like AMD SEV have recently also started to receive more attention. A
common technique when attacking SGX enclaves is single-stepping, where the
system's APIC timer is used to interrupt the enclave after every instruction. …
academia amd amd sev attack attack vectors availability environments framework influence intel research sgx single