Loading Seminars

« All Seminars

  • This seminar has passed.

One Glitch to Rule them All: Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

15 December 2021 @ 3:00 pm - 4:00 pm

Abstract: In this talk, we present our voltage fault injection attack against the AMD Secure Processor (AMD-SP / PSP). The AMD-SP is an ARM core, embedded into modern AMD CPUs. It hosts the firmware implementing the SEV API and is a single point of failure for the SEV technology. Our attack allows us to deploy custom code on the AMD-SP on Zen 1, Zen 2 and Zen 3 CPUs. We present how our attack allows attackers to fully circumvent SEV’s protection guarantees. To the best of our knowledge, the presented attack cannot be mitigated and questions SEV’s security promises on all affected CPU generations.

Attendance via Zoom (Meeting ID: 945 9007 2989, Passcode: 102435)

Livestream via YouTube

Youtube VoD

Details

Date:
15 December 2021
Time:
3:00 pm - 4:00 pm
Seminar Tags:
, , , ,

Presenter

Robert Buhren (TU Berlin)

Robert Buhren is a security researcher and firmware reverse engineer currently pursuing a PhD at the Technische Universität Berlin. In his research, Robert focuses on cloud security and security aspects of virtualization.

Leave a Reply

Your email address will not be published. Required fields are marked *