Researchers Break SGX Protections With DDR4 WireTap
A Georgia Tech and Purdue team showed memory‑bus interposition can recover enclave secrets, undermining confidential AI workloads
Disclosure and method
Academics disclosed WireTap, a DDR4 memory‑bus interposer that passively decrypts data moving in and out of Intel SGX enclaves. The method enables extraction of secrets such as ECDSA keys from protected workloads.
Why AI teams should care
SGX backs confidential training and inference for sensitive models. WireTap demonstrates that physical interposition on DDR4 can defeat enclave guarantees, raising concerns for healthcare, finance, and government deployments.
Mitigation landscape
- Audit use of SGX for confidential AI workloads on DDR4 systems
- Consider platform updates and alternative enclave technologies
- Reassess threat models that assume privileged …
Archive Access
This article is older than 24 hours. Create a free account to access our 7-day archive.