Researchers developed a proof of concept attack which allows them to hide malware in Intel’s Software Guard eXtensions (SGX).
Intel SGX is a feature found on all modern Intel CPUs that allows developers to isolate applications in secure “enclaves” and the attack allows researchers to hide undetectable malicious code from their security software within these enclaves, according to the proof of concept.
Previously, the only known vulnerabilities affecting SGX enclaves were side channel attacks that leaked data being processed into the enclave but now the most recent researcher demonstrates how the enclaves can be used to conceal malware.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.