Research

Researchers Break SGX Protections With DDR4 WireTap

A Georgia Tech and Purdue team showed memory‑bus interposition can recover enclave secrets, undermining confidential AI workloads

Olivia Sharp 1 min read 701 views
Free
Researchers unveiled WireTap, showing a DDR4 interposer can extract secrets from Intel SGX enclaves and challenging confidential AI assumptions.

Disclosure and method

Academics disclosed WireTap, a DDR4 memory‑bus interposer that passively decrypts data moving in and out of Intel SGX enclaves. The method enables extraction of secrets such as ECDSA keys from protected workloads.

Why AI teams should care

SGX backs confidential training and inference for sensitive models. WireTap demonstrates that physical interposition on DDR4 can defeat enclave guarantees, raising concerns for healthcare, finance, and government deployments.

Mitigation landscape

  • Audit use of SGX for confidential AI workloads on DDR4 systems
  • Consider platform updates and alternative enclave technologies
  • Reassess threat models that assume privileged …

Archive Access

This article is older than 24 hours. Create a free account to access our 7-day archive.

Share this article

Related Articles