Tech

AMD VM security tools can be bypassed, letting hackers infilitrate your devices, experts warn

Share
Share


  • University researchers find way to trick AMD’s secure VM tech into sharing sensitive information
  • AMD released a security advisory with recommended mitigations
  • The bug requires physical access, but in some scenarios could be abused through software alone

AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts have warned.

Security researchers from multiple universities in the EU and the UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt virtual machine (VM) memory to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys unique to each VM, ensuring data remains confidential and tamper-proof even in shared environments.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
New report on importance of measurement of engineering
Tech

New report on importance of measurement of engineering

Credit: National Physical Laboratory A new report launched today by the Institution...

Low-carbon development enhances wind and solar synergy in China, study finds
Tech

Low-carbon development enhances wind and solar synergy in China, study finds

Credit: Pixabay/CC0 Public Domain A new study led by Prof. Chen Yaning...

In an era where empathy feels unfamiliar, AI now translates emotions
Tech

In an era where empathy feels unfamiliar, AI now translates emotions

The operation process of the AI agent EmoSync, which generates personalized analogy...

Tech

AMD VM security tools can be bypassed, letting hackers infilitrate your devices, experts warn

Share
Share


  • University researchers find way to trick AMD’s secure VM tech into sharing sensitive information
  • AMD released a security advisory with recommended mitigations
  • The bug requires physical access, but in some scenarios could be abused through software alone

AMD Virtual Machine (VM) security tools can be bypassed, allowing cybercriminals to infiltrate devices and steal sensitive data, experts have warned.

Security researchers from multiple universities in the EU and the UK outlined how AMD chips come with Secure Encrypted Virtualization (SEV), a security feature designed to encrypt virtual machine (VM) memory to protect it from unauthorized access, including by the hypervisor or other VMs. SEV uses hardware-based encryption keys unique to each VM, ensuring data remains confidential and tamper-proof even in shared environments.

Share

Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Articles
New report on importance of measurement of engineering
Tech

New report on importance of measurement of engineering

Credit: National Physical Laboratory A new report launched today by the Institution...

Low-carbon development enhances wind and solar synergy in China, study finds
Tech

Low-carbon development enhances wind and solar synergy in China, study finds

Credit: Pixabay/CC0 Public Domain A new study led by Prof. Chen Yaning...

In an era where empathy feels unfamiliar, AI now translates emotions
Tech

In an era where empathy feels unfamiliar, AI now translates emotions

The operation process of the AI agent EmoSync, which generates personalized analogy...