Intel’s SGX Security Shattered: Research Unveils Costly WireTap Hack!
Researchers have shown Intel’s SGX can be bypassed on DDR4 systems, proving that even the toughest security can be cracked with the right tools and a little creativity. Dubbed WireTap, this attack is like the comedy duo of security breaches, working alongside the Battering RAM to expose vulnerabilities in SGX and SEV.

Hot Take:
Move over, James Bond gadgets! Intel’s SGX might need a new wardrobe after this wardrobe malfunction. The WireTap attack method is like finding out your vault’s combination is written on the underside of your welcome mat. It seems that even the most trusted enclaves have a leaky ceiling. Maybe it’s time SGX takes a page from Fort Knox and adds a moat—or at least a “No Trespassing” sign.
Key Points:
- Researchers from Georgia Tech and Purdue University have bypassed Intel’s SGX on DDR4 systems.
- WireTap attack uses a physical interposer to decrypt sensitive data.
- Attack exploits deterministic encryption to recover SGX’s secret keys.
- Intel’s response: “This isn’t our threat model’s problem.”
- WireTap setup costs around $1,000, making it pricier than other attacks like Battering RAM.
Already a member? Log in here