https://www.intel.com/content/www/us/en/developer/tools/software-guard-extensions/overview.html memory encryption technology sounded like such a good idea back in 2015. This set of security instructions would enable programmers to set up protected private memory regions, called enclaves.

Oh well, it was a nice idea while it lasted.

An attacker can target data in use, such as register values and memory loads, and data at rest, e.g., SGX-enclave data pages.

While its Common Vulnerability Scoring System (CVSS) score is only 6.0, for people that rely on SGX for security, it’s much nastier.

Related Articles