Many modern processors expose privileged software interfaces to dynamically modify the frequency and voltage. These interfaces were introduced to cope with the ever-growing power consumption of modern computers. In this talk we show how these privileged interfaces can be exploited to undermine the system’s security. We present the Plundervolt attack – demonstrating how we can corrupt the integrity of Intel SGX computations. We also investigate whether Intel's mitigations have worked.
Kit is currently pursuing a PhD in Cyber Security at The University of Birmingham. Her research interests include embedded hardware and software based fault injections. Kit is also researching reverse engineering of hardware faults through software emulation. Kit currently leads the University’s Ethical Hacking Club, AFNOM which encourages students to learn offensive security in a friendly, informal environment.