University researchers find way to trick AMD’s secure VM tech into sharing sensitive information
AMD released a security advisory with recommended mitigations
The bug requires physical access, but in some scenarios could be abused through software alone
AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts have warned.
Security researchers from multiple universities in the EU and the UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt virtual machine (VM) memory to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys unique to each VM, ensuring data remains confidential and tamper-proof even in shared environments.
+ There are no comments
Add yours