"New CounterSEVeillance and TDXDown Attacks Target AMD and Intel TEEs"

Intel and AMD have responded to security researchers' discoveries of new attack methods called "TDXDown" and "CounterSEVeillance" that target Trust Domain Extensions (TDX) and Secure Encrypted Virtualization (SEV) technology. The research focused on Intel and AMD Trusted Execution Environments (TEEs), which isolate the protected application or Virtual Machine (VM) from the operating system and other software on the same physical system in order to protect code and data. This article continues to discuss the TDXDown and CounterSEVeillance attack methods that can be used against TDX and SEV technology.

SecurityWeek reports "New CounterSEVeillance and TDXDown Attacks Target AMD and Intel TEEs"

Submitted by grigby1
 

Submitted by Gregory Rigby on