Get the latest tech news

AMD’s trusted execution environment blown wide open by new BadRAM attack


Attack bypasses AMD protection promising security, even when a server is compromised.

Some of the world’s most sensitive information—health records, financial account information, sealed legal documents, and the like—now often resides on servers that receive day-to-day maintenance from unknown administrators working in cloud centers thousands of miles from the companies responsible for safeguarding it. In response, chipmakers have begun baking protections into their silicon to provide assurances that even if a server has been physically tampered with or infected with malware, sensitive data funneled through virtual machines can’t be accessed without an encryption key that’s known only to the VM administrator. On Tuesday, an international team of researchers unveiled BadRAM, a proof-of-concept attack that completely undermines security assurances that chipmaker AMD makes to users of one of its most expensive and well-fortified microprocessor product lines.

Get the Android app

Or read this on ArsTechnica

Read more on:

Photo of AMD

AMD

Photo of new BadRAM attack

new BadRAM attack

Photo of BadRAM

BadRAM

Related news:

News photo

AMD secure VM tech undone by DRAM meddling

News photo

NVIDIA R565 vs. Linux 6.13 + Mesa 25.0 Git AMD / Intel Graphics For Linux Gaming

News photo

Nvidia almost produced an x86 CPU to rival AMD and Intel, but was forced to move to Arm due to 'certain legal issues'