WELCOME
to the house of Harry Plopper
Intel is not the only company supporting SGX, as Intel
Intel is not the only company supporting SGX, as Intel recently disclosed that it has installed its own vulnerability testing program in its own servers. As an initial product of this research, Intel's SGX vulnerability testing program has detected that a malicious program attempting to enter a vulnerable enclave can gain access to the enclave and bypass a decryption of its data. For example, a program could try to run a program that would steal an encryption key, and then encrypt it in a way that would allow it to access the enclave without the encryption keys. The vulnerability is similar to what the developers of a new security tool in the Hacking Team discovered in 2011, but it's different in that it was specifically designed to prevent a malicious program from entering the enclave through a backdoor into a system.
Intel's program, called GXK, is designed to provide a backdoor into an enclave that is not affected by the exploit. GXK detects an attacker's program inside an enclave, and attempts to decrypt its data using a combination of the following three methods:
SSG code through the Intel Graphics Card's secure data access mode;
SSG code through the Intel Graphics Card's secure data access mode; and
SSG code through the Secure Graphics Card's secure data access mode. The code is decrypted by the Intel Graphics Card's secure data access mode, which is then followed by the Secure Graphics Card's secure data access mode. For example, the GXK tool can detect that an attacker does not know the code of the chip, and then use it to execute the backdoor attack.
The Intel Graphics Card is a highly secure chip, being able to detect and decrypt an embedded message as well as a piece of data. It's also very fast, so it can run a very large amount of work before it even reaches the chip. It's even possible to use it to attack the CPU of a single server, with a few seconds to work it out. Intel is now also working with Nvidia to create an open source, distributed version of its security tool, which will allow it to run its tools on even a very small number of servers.
Intel has not yet revealed its plan to deploy its own vulnerability testing program for the Hacking Team. For now, Intel and its partners are looking for other solutions that work on multiple systems. It's possible this research could help prevent or mitigate attacks against Hacking Team malware.If you want to get your hands on it, here's everything you need to know about the HTC One M9
Comment an article