Plundervolt steals keys from cryptographic algorithms
An international team of white hat researchers has successfully corrupted the integrity of Intel Software Guard Extensions (SGX) on Intel Core processors with a software-based fault injection attack aptly dubbed “Plundervolt.” Using Plundervolt, attackers can recover keys from cryptographic algorithms (including the AES-NI instruction set extension) and induce memory safety vulnerabilities into bug-free enclave code.
To read the full article, click here
Related Semiconductor IP
Related Blogs
- Validating Cryptographic Algorithms to FIPS 140-2
- How to Separate your Cryptographic Keys
- ReRAM Gets a Boost from Smart Algorithms
- Moore's Law Continues, but Needs Help from Heterogeneous Computing
Latest Blogs
- Satellite communications are no longer as secure as assumed
- Why Hardware Monitoring Needs Infrastructure, Not Just Sensors
- Why Post-Quantum Cryptography Doesn’t Replace Classical Cryptography
- The Silent Guardian of AI Compute - PUFrt Unifies Hardware Security and Memory Repair to Build the Trust Foundation for AI Factories
- Heterogeneous NPU Data Movement Tax: Intel's Own Slides Tell the Story