AMD’s Safe Encrypted Virtualization (SEV), meant to guard processor reminiscence from prying eyes in digital machine (VM) environments, might be tricked into giving entry to its encrypted reminiscence contents utilizing a check rig costing lower than $10, researchers have revealed.
Dubbed “BadRAM” by researchers from the College of Lübeck in Germany, KU Leven in Belgium, and the College of Birmingham within the UK, the proposed assault is conceptually easy in addition to low cost: trick the CPU into considering it has extra reminiscence than it actually has, utilizing a rogue reminiscence module, and get it to put in writing its supposedly secret reminiscence contents to the “ghost” house.
The researchers achieved this utilizing a check rig anybody might purchase, consisting of a Raspberry Pi Pico, costing just a few {dollars}, and a DIMM socket to carry DDR4/5 RAM modules. First, they manipulated the serial presence detect (SPD) chip constructed into the reminiscence module to misreport the quantity of onboard reminiscence when booting up — the “BadRAM” a part of the assault.