Researchers exploit Intel SGX to hide malware
A team of researchers have discovered a way to run malicious code on systems with Intel chips in such a way that antivirus software is unable to detect it.
When the chip giant released its Skylake processors back in 2015, the company included a new feature called Software Guard eXtensions (SGX) that allows developers to isolate applications inside secure enclaves.
The enclaves operate within a hardware-isolated section of the CPU’s processing memory where applications can carry out operations dealing with sensitive details such as encryption keys, passwords, user data and more.
- Intel launches neural network on a stick
- Malware threats continue to rise and target IoT
- Half a billion Android users downloaded malware from Play Store
Researchers Michael
Be the first to write a comment.