WeSee: using malicious# VC interrupts to break AMD SEV-SNP

B Schlüter, S Sridhara, A Bertschi… - 2024 IEEE Symposium …, 2024 - ieeexplore.ieee.org
AMD SEV-SNP offers VM-level trusted execution environments (TEEs) to protect the
confidentiality and integrity for sensitive cloud workloads from untrusted hypervisor …

TDXdown: Single-Step** and Instruction Counting Attacks against Intel TDX

L Wilke, F Sieck, T Eisenbarth - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Trusted Execution Environments are a promising solution for solving the data privacy and
trust issues introduced by cloud computing. As a result, all major CPU vendors integrated …

[PDF][PDF] BadRAM: Practical Memory Aliasing Attacks on Trusted Execution Environments

J De Meulemeester, L Wilke… - … on Security and …, 2024 - research.birmingham.ac.uk
The growing adoption of cloud computing raises pressing concerns about trust and data
privacy. Trusted Execution Environments (TEEs) have been proposed as promising …

Cross-Core Interrupt Detection: Exploiting User and Virtualized IPIs

F Rauscher, D Gruss - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Interrupts are fundamental for inter-process and cross-core communication in modern
systems. Controlling these communication mechanisms historically requires switches into …

TCEC: Integrity protection for containers by trusted chip on IoT edge computing nodes

W Li, B Zhao, L Zhu, Y Wang, Q Zhong… - IEEE Sensors …, 2024 - ieeexplore.ieee.org
In edge computing, an Internet of Things (IoT) node may employ container-based
virtualization to manage and process data collected by sensors. Compared to cloud …

Confidential Computing on Heterogeneous CPU-GPU Systems: Survey and Future Directions

Q Wang, D Oswald - arxiv preprint arxiv:2408.11601, 2024 - arxiv.org
In recent years, the widespread informatization and rapid data explosion have increased the
demand for high-performance heterogeneous systems that integrate multiple computing …

Confidential VMs Explained: An Empirical Analysis of AMD SEV-SNP and Intel TDX

M Misono, D Stavrakakis, N Santos… - Proceedings of the ACM …, 2024 - dl.acm.org
Confidential computing is gaining traction in the cloud, driven by the increasing security and
privacy concerns across various industries. Recent trusted hardware advancements …

Aster: Fixing the android tee ecosystem with arm cca

M Kuhne, S Sridhara, A Bertschi, N Dutly… - arxiv preprint arxiv …, 2024 - arxiv.org
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted
hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …

Formal security analysis of the amd sev-snp software interface

P Paradžik, A Derek, M Horvat - Ieee transactions on …, 2025 - ieeexplore.ieee.org
AMD Secure Encrypted Virtualization technologies enable confidential computing by
protecting virtual machines from highly privileged software such as hypervisors. In this work …

SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals

S Sridhara, A Bertschi, B Schlüter, S Shinde - arxiv preprint arxiv …, 2024 - arxiv.org
User programs recover from hardware exceptions and respond to signals by executing
custom handlers that they register specifically for such events. We present SIGY attack …