Intel has given up on securing SGX from physical attacks
英特尔表示该漏洞超出其威胁模型范围,因需物理接触硬件;不计划发布 CVE 或补丁,建议在安全环境运行服务器并使用具备物理安全的云服务。 2025-10-1 22:17:59 Author: www.reddit.com(查看原文) 阅读量:0 收藏

> In response to the findings, Intel said the exploit is outside the scope of its threat model since it assumes a physical adversary that has direct access to the hardware with a memory bus interposer. In the absence of a "patch," it's recommended that the servers be run in secure physical environments and use cloud providers that provide independent physical security.

> "Such attacks are outside the scope of the boundary of protection offered by Advanced Encryption Standard-XEX-based Tweaked Codebook Mode with Ciphertext Stealing (AES-XTS) based memory encryption," the chipmaker said. "As it provides limited confidentiality protection, and no integrity or anti-replay protection against attackers with physical capabilities, Intel does not plan to issue a CVE."


文章来源: https://www.reddit.com/r/blackhat/comments/1nvmdoc/intel_has_given_up_on_securing_sgx_from_physical/
如有侵权请联系:admin#unsafe.sh