Battering RAM: The $50 Hack That Pummels Intel and AMD Security Defenses
Battering RAM, a new $50 hardware vulnerability, bypasses Intel and AMD security by redirecting protected memory addresses. Academics demonstrate how Intel’s SGX and AMD’s SEV-SNP features can be compromised, highlighting the limits of current memory encryption. The attack exploits DDR4 interposer hardware, rendering cloud environments vulnerable to unauthorized access.

Hot Take:
Forget about RAM standing for Random Access Memory; with Battering RAM, it seems more like Really Accessible Memory! Who knew a $50 gadget could turn your cloud into a stormy mess? Intel and AMD, time to beef up those defenses before someone starts selling these on eBay!
Key Points:
– Battering RAM is a newly discovered vulnerability that exploits Intel and AMD cloud processors.
– The $50 interposer device stealthily redirects protected memory addresses.
– Intel’s SGX and AMD’s SEV-SNP security features are compromised.
– Physical attacks like Battering RAM are not within the current security scope of Intel and AMD.
– Defending against Battering RAM would require a fundamental redesign of memory encryption.