Loading Seminars

« All Seminars

One Glitch to Rule them All: Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

December 15 (2021) @ 3:00 pm - 4:00 pm

Abstract: In this talk, we present our voltage fault injection attack against the AMD Secure Processor (AMD-SP / PSP). The AMD-SP is an ARM core, embedded into modern AMD CPUs. It hosts the firmware implementing the SEV API and is a single point of failure for the SEV technology. Our attack allows us to deploy custom code on the AMD-SP on Zen 1, Zen 2 and Zen 3 CPUs. We present how our attack allows attackers to fully circumvent SEV’s protection guarantees. To the best of our knowledge, the presented attack cannot be mitigated and questions SEV’s security promises on all affected CPU generations.

Attendance information to follow.


December 15 (2021)
3:00 pm - 4:00 pm
Seminar Tags:
, , , ,


Robert Buhren (TU Berlin)

Robert Buhren is a security researcher and firmware reverse engineer currently pursuing a PhD at the Technische Universität Berlin. In his research, Robert focuses on cloud security and security aspects of virtualization.

Leave a Reply

Your email address will not be published. Required fields are marked *