IT SPARC Cast

Trusted Execution Environment (TEE) Hardware Attacks


Listen Later

In this eye-opening episode of IT SPARC Cast - CVE of the Week, John Barger and Lou Schmidt explore a shocking vulnerability that doesn’t exploit code — it exploits hardware. Specifically, they dive into how Intel and AMD’s Trusted Execution Environments (TEEs), once hailed as unbreakable, can be compromised via physical attacks. From voltage glitching to signal probing, these advanced threats are no longer theoretical and could sidestep your most hardened security measures.


The episode highlights real-world methods like side-channel probing, interposers, and even fault injection used to extract secrets directly from servers. If a malicious actor can gain physical access to your systems, all bets are off. Lou breaks down the Heracles attack on both AMD SEV and Intel SGX. The hosts emphasize just how crucial physical access controls, chassis alarms, and access logs really are.


Don’t underestimate your weakest link — your data center lock and key.



🔗 Social Links (Wrap Up Section):


IT SPARC Cast

@ITSPARCCast on X

https://www.linkedin.com/company/sparc-sales/ on LinkedIn


John Barger

@john_Video on X

https://www.linkedin.com/in/johnbarger/ on LinkedIn


Lou Schmidt

@loudoggeek on X

https://www.linkedin.com/in/louis-schmidt-b102446/ on LinkedIn

Hosted on Acast. See acast.com/privacy for more information.

...more
View all episodesView all episodes
Download on the App Store

IT SPARC CastBy John Barger