Plundervolt steals keys from cryptographic algorithms
An international team of white hat researchers has successfully corrupted the integrity of Intel Software Guard Extensions (SGX) on Intel Core processors with a software-based fault injection attack aptly dubbed “Plundervolt.” Using Plundervolt, attackers can recover keys from cryptographic algorithms (including the AES-NI instruction set extension) and induce memory safety vulnerabilities into bug-free enclave code.
To read the full article, click here
Related Semiconductor IP
Related Blogs
- Validating Cryptographic Algorithms to FIPS 140-2
- How to Separate your Cryptographic Keys
- ReRAM Gets a Boost from Smart Algorithms
- Cowan's LRA model: Actual July 2010 global semicon sales $24.57bn; down 9.5 percent from last month (June)
Latest Blogs
- Shaping the Future of Semiconductor Design Through Collaboration: Synopsys Wins Multiple TSMC OIP Partner of the Year Awards
- Pushing the Boundaries of Memory: What’s New with Weebit and AI
- Root of Trust: A Security Essential for Cyber Defense
- Evolution of AMBA AXI Protocol: An Introduction to the Issue L Update
- An Introduction to AMBA CHI Chip-to-Chip (C2C) Protocol