Adobe Stock graphic of simulated cyber padlock digitized and glowing screen blue

New Physical Attacks are Quickly Diluting Secure Enclave Defenses

Blank Space (small)
(text and background only visible when logged in)
Full Story from Ars Technica https://arstechnica.com/security/2025/10/new-physical-attacks-are-quickly-dilut…

New research from Georgia Tech Associate Professor Daniel Genkin has revealed major hardware security vulnerabilities. The newly identified risks are related to trusted execution environments (TEE).

As Ars Technica reports, "TEEs, are everywhere—in blockchain architectures, virtually every cloud service, and computing involving AI, finance, and defense contractors. It’s hard to overstate the reliance that entire industries have on three TEEs in particular: Confidential Compute from Nvidia, SEV-SNP from AMD, and SGX and TDX from Intel.

All three come with assurances that confidential data and sensitive computing can’t be viewed or altered, even if a server has suffered a complete compromise of the operating kernel.

A trio of novel physical attacks raises new questions about the true security offered by these TEES and the exaggerated promises and misconceptions coming from the big and small players using them."

Full Story: New Physical Attacks are Quickly Diluting Secure Enclave Defenses