Plundervolt steals keys from cryptographic algorithms
An international team of white hat researchers has successfully corrupted the integrity of Intel Software Guard Extensions (SGX) on Intel Core processors with a software-based fault injection attack aptly dubbed “Plundervolt.” Using Plundervolt, attackers can recover keys from cryptographic algorithms (including the AES-NI instruction set extension) and induce memory safety vulnerabilities into bug-free enclave code.
To read the full article, click here
Related Semiconductor IP
Related Blogs
- Validating Cryptographic Algorithms to FIPS 140-2
- How to Separate your Cryptographic Keys
- ReRAM Gets a Boost from Smart Algorithms
- Cowan's LRA model: Actual July 2010 global semicon sales $24.57bn; down 9.5 percent from last month (June)
Latest Blogs
- Rivos and Canonical partner to deliver scalable RISC-V solutions in Data Centers and enable an enterprise-grade Ubuntu experience across Rivos platforms
- ReRAM-Powered Edge AI: A Game-Changer for Energy Efficiency, Cost, and Security
- Ceva-XC21 and Ceva-XC23 DSPs: Advancing Wireless and Edge AI Processing
- Cadence Silicon Success of UCIe IP on Samsung Foundry’s 5nm Automotive Process
- Empowering your Embedded AI with 22FDX+