Sunday, April 13, 2025
Homecyber securityCritical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Critical Isolation Vulnerability in Intel Trust Domain Extensions Exposes Sensitive Data

Published on

SIEM as a Service

Follow Us on Google News

Researchers from IIT Kharagpur and Intel Corporation have identified a significant security vulnerability in Intel Trust Domain Extensions (TDX), a foundational technology designed to ensure robust isolation between virtual machines (VMs) in secure environments.

The study reveals that hardware performance counters (HPCs), meant for performance monitoring, can be exploited by Virtual Machine Managers (VMMs) to breach the isolation between Trust Domains (TDs) and the VMM itself.

This vulnerability undermines the core promise of TDX to provide a secure execution environment for sensitive workloads.

- Advertisement - Google News

Isolation Breach Confirmed

TDX, an enhancement over Intel’s previous enclave-based technology (SGX), aims to ensure full isolation of a TD’s memory, computation, and CPU state from the VMM.

However, the findings reveal that when a TD and VMM share the same core, core resource contention occurs.

This contention manifests as observable variations in HPC metrics like branch misses, CPU cycles, and cache load misses, which are accessible to the VMM.

By leveraging this data, researchers demonstrated the ability to distinguish between idle and active TDs, fingerprint running processes, and even extract fine-grained details of machine learning inference tasks.

The researchers deployed two distinct workloads simple idle operations and computationally intensive tasks within a TD, collecting HPC data via the Linux perf tool.

The stark differences observed in the HPC metrics allowed clear differentiation between the two workloads, showcasing the inadequacy of TDX’s current protections.

Process Fingerprinting

Going beyond basic isolation breaches, the vulnerability facilitates sophisticated attacks, including:

1.Process Fingerprinting: Using HPC data, researchers successfully identified distinctive patterns of nine separate UnixBench workload processes running within a TD. A convolutional neural network (CNN) trained on this data achieved near-perfect classification accuracy, enabling precise identification of workloads.

2.Class Leakage Attacks on Machine Learning Models: By monitoring HPCs during inference operations of CNNs on CIFAR-10 and CIFAR-100 image datasets, the researchers differentiated between 42/45 class pairs for CIFAR-10 and 4,489/4,950 pairs for CIFAR-100. This capability exposes sensitive model outputs to a malicious VMM, posing a critical threat to privacy and confidentiality.

This research highlights the urgent need for Intel® to address vulnerabilities in TDX’s isolation guarantees.

Currently, even with memory encryption and restricted access controls, critical information about the TD’s internal operations can inadvertently leak through HPCs, enabling side-channel attacks under malicious VMM scenarios.

While the TDX module is a significant step forward compared to Intel SGX, this vulnerability emphasizes the need for further architectural safeguards to eliminate covert channels and prevent information leakage in virtualized environments.

Without enhanced measures, the efficacy of TDX as a trusted execution technology to secure sensitive workloads remains compromised.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...