New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors
Modern servers use DDR4 DRAM with hardware-backed encryption, such as Intel SGX’s Total Memory Encryption (TME) and AMD SEV-SNP, to guard private data.
Previous research on “BadRAM” exploited false SPD metadata at boot time; in response, vendors implemented stricter boot-time alias checks.
Battering RAM operates dynamically, where a custom interposer sits between the CPU and DIMM, transparent during POST, and evades SPD spoofing checks.
Once the system is online, an analog switch flips, redirecting encrypted traffic from victim addresses to an attacker-controlled alias buffer.
Captured ciphertext is then replayed into a controlled enclave, yielding arbitrary plaintext access. This attack fully compromises both SGX and SEV-SNP attestation on patched cloud platforms, enabling read/write of enclave memory.
The interposer design, shared on GitHub, uses two SPDT analog switches and a microcontroller to toggle aliasing at runtime.
This code fragment illustrates the two-phase capture-and-replay process that yields decrypted enclave data.
Battering RAM exposes fundamental flaws in static memory-encryption engines, which lack cryptographic freshness checks.
Because TME and SEV-SNP derive ciphertext solely from a fixed key and physical address, replayed data decrypts predictably, nullifying passive-attack defenses like cold-boot mitigation.
Key implications include:
Academic teams at KU Leuven, University of Birmingham, and Durham University conducted the research and have published schematics, firmware, and proof-of-concept code under CC0.
Both Intel and AMD have issued security advisories acknowledging the findings, but note that physical interposer attacks are beyond the current product scope.
As public cloud adoption of SGX and SEV-SNP grows, covering services on AWS, Azure, Google Cloud, and IBM Cloud, organizations must reassess the physical security of datacenter infrastructure.
Without significant enhancements to memory encryption protocols, Battling RAM underscores that confidential computing is not indestructible.
Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.
The post New Battering RAM Attack Bypasses Latest Defenses on Intel and AMD Cloud Processors appeared first on Cyber Security News.
WASHINGTON (AP) — President Donald Trump made new threats to escalate strikes in Iran on…
EASTHAMPTON — In an effort to create a clearer and more cohesive downtown, the city…
SHUTESBURY — Shutesbury officials are continuing to take corrective action following the recent release of…
AMHERST — After breakfast each morning, Amherst Regional High School sophomore Ra-Star Ferreira rode on…
DEERFIELD — With a tough budget year ahead, Deerfield officials are discussing the need for…
SUNDERLAND — Discussion on the proposal for a 9,100-square-foot Dollar General on the corner of…
This website uses cookies.