New Attacks Against Secure Enclaves
好的,我现在需要帮用户总结一篇文章的内容,控制在100个字以内。用户已经提供了文章的原文,我先仔细阅读一下。 文章主要讨论了数据加密在不同状态下的保护情况,特别是数据在使用时的保护措施。提到了可信执行环境(TEEs)或安全飞地(secure enclaves)的重要性,以及它们如何在云环境中保护数据。接着,文章指出最近的攻击如TEE.fail能够绕过这些保护机制,强调了物理安全的重要性。 接下来,我需要将这些要点浓缩到100字以内。首先,确定关键点:数据加密、安全飞地、云服务中的应用、TEE.fail攻击、物理安全威胁。 然后组织语言,确保简洁明了。可能的结构是先介绍安全飞地的作用,再提到攻击的影响,最后点出物理安全的重要性。 最后检查字数是否符合要求,并确保没有使用用户禁止的开头方式。 </think> 文章探讨了数据加密技术在云服务中的应用及其局限性。可信执行环境(TEEs)或安全飞地通过硬件功能保护数据在使用中的安全性。然而,最近的TEE.fail攻击展示了这些机制的漏洞,强调了物理安全的重要性。 2025-11-10 12:4:55 Author: www.schneier.com(查看原文) 阅读量:10 收藏

Encryption can protect data at rest and data in transit, but does nothing for data in use. What we have are secure enclaves. I’ve written about this before:

Almost all cloud services have to perform some computation on our data. Even the simplest storage provider has code to copy bytes from an internal storage system and deliver them to the user. End-to-end encryption is sufficient in such a narrow context. But often we want our cloud providers to be able to perform computation on our raw data: search, analysis, AI model training or fine-tuning, and more. Without expensive, esoteric techniques, such as secure multiparty computation protocols or homomorphic encryption techniques that can perform calculations on encrypted data, cloud servers require access to the unencrypted data to do anything useful.

Fortunately, the last few years have seen the advent of general-purpose, hardware-enabled secure computation. This is powered by special functionality on processors known as trusted execution environments (TEEs) or secure enclaves. TEEs decouple who runs the chip (a cloud provider, such as Microsoft Azure) from who secures the chip (a processor vendor, such as Intel) and from who controls the data being used in the computation (the customer or user). A TEE can keep the cloud provider from seeing what is being computed. The results of a computation are sent via a secure tunnel out of the enclave or encrypted and stored. A TEE can also generate a signed attestation that it actually ran the code that the customer wanted to run.

Secure enclaves are critical in our modern cloud-based computing architectures. And, of course, they have vulnerabilities:

The most recent attack, released Tuesday, is known as TEE.fail. It defeats the latest TEE protections from all three chipmakers. The low-cost, low-complexity attack works by placing a small piece of hardware between a single physical memory chip and the motherboard slot it plugs into. It also requires the attacker to compromise the operating system kernel. Once this three-minute attack is completed, Confidential Compute, SEV-SNP, and TDX/SDX can no longer be trusted. Unlike the Battering RAM and Wiretap attacks from last month—which worked only against CPUs using DDR4 memory—TEE.fail works against DDR5, allowing them to work against the latest TEEs.

Yes, these attacks require physical access. But that’s exactly the threat model secure enclaves are supposed to secure against.

Tags: , , ,

Posted on November 10, 2025 at 7:04 AM0 Comments

Sidebar photo of Bruce Schneier by Joe MacInnis.


文章来源: https://www.schneier.com/blog/archives/2025/11/new-attacks-against-secure-enclaves.html
如有侵权请联系:admin#unsafe.sh