Robert Buhren (TU Berlin) – Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

References:

Look…If you’re searching for the Robert Buhren (TU Berlin) – Fault Injection Attacks against AMD’s Secure Encrypted Virtualization video, you’ve found the right place. In this step by step video, you’ll learn secrets from the best engineers…

Robert Buhren (TU Berlin) - Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

Robert Buhren (TU Berlin) – Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

One Glitch to Rule them All: Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

Abstract: In this talk, we present our voltage fault injection attack against the AMD Secure Processor (AMD-SP / PSP). The AMD-SP is an ARM core, embedded into modern AMD CPUs. It hosts the firmware implementing the SEV API and is a single point of failure for the SEV technology. Our attack allows us to deploy custom code on the AMD-SP on Zen 1, Zen 2 and Zen 3 CPUs. We present how our attack allows attackers to fully circumvent SEV’s protection guarantees. To the best of our knowledge, the presented attack cannot be mitigated and questions SEV’s security promises on all affected CPU generations.

Related reading:

Get ready to watch Robert Buhren (TU Berlin) – Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

Did you like this tutorial? Then watch more exciting Virtualization Software videos

Leave a Reply