Hacking TEEs in server infrastructure
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
5 articles
Two separate research papers vividly demonstrate how virtual systems can be compromised in a hostile environment — specifically, when the data owner can’t even trust the cloud provider.
European researchers have discovered a vulnerability in AMD processors that can be exploited by modifying RAM modules.
We investigate the connection between software security and leaks when handling RAM.