Improving Side-Channel Protections for Intel TDX
This talk demonstrates a side-channel attack technique against Intel Trust Domain Extensions (TDX) that uses malicious single-stepping to bypass security protections. The researchers show how an attacker can abuse the Advanced Programmable Interrupt Controller (APIC) timer to gain control over virtual machine execution and perform architectural analysis. They also present two mitigation strategies, including the Instruction Counting Single-Step Defense (ICSSD) feature, to prevent such attacks. The presentation includes multiple proof-of-concept demonstrations showing the attack and the effectiveness of the proposed mitigations.
Bypassing Intel TDX Confidentiality with Malicious Single-Stepping
TLDR: Researchers have demonstrated a side-channel attack against Intel Trust Domain Extensions (TDX) that uses malicious single-stepping to bypass memory isolation. By abusing the APIC timer to force VM exits on specific instruction boundaries, an attacker can perform architectural analysis on a victim VM. This research highlights the critical need for hardware-level defenses like Instruction Counting Single-Step Defense (ICSSD) in multi-tenant cloud environments.
Confidential computing is the current gold standard for protecting data in use, but it is not a silver bullet. While technologies like Intel Trust Domain Extensions (TDX) provide strong isolation for virtual machines, they are still subject to the laws of microarchitectural physics. If you are a researcher or a pentester working in cloud environments, you need to understand that hardware-based isolation does not automatically neutralize side-channel threats. The recent research presented at Black Hat 2024 on attacking Intel TDX proves that even the most hardened TEEs can be forced to leak information if an attacker can manipulate the execution flow at the instruction level.
The Mechanics of the Single-Step Attack
The core of this research relies on a technique known as malicious single-stepping. In a standard virtualization setup, the hypervisor or Virtual Machine Monitor (VMM) has the power to pause and resume guest execution. By abusing this, an attacker can force a victim VM to execute exactly one instruction at a time. This is not a new concept, as the SGX-Step framework previously demonstrated how to achieve this on Intel SGX enclaves. The challenge with TDX is that it is a virtualization-based technology, which introduces a different set of constraints and a much larger attack surface compared to process-based enclaves.
The researchers identified that the Advanced Programmable Interrupt Controller (APIC) timer is the perfect primitive for this attack. By configuring the APIC timer to trigger an interrupt at a precise cycle count, a malicious VMM can force a VM exit on every instruction boundary. Once the VM exits, the attacker gains control, performs their architectural analysis, and then resumes the victim VM. This effectively turns the hypervisor into a debugger for the guest, allowing the attacker to observe the victim's execution flow without ever needing to see the plaintext data directly.
Why Frequency Scaling Matters
One of the most fascinating aspects of this research is how the team bypassed the built-in mitigations. When they first attempted to single-step a TDX-protected VM, they found that the hardware had a built-in defense mechanism that detected if an instruction took too few cycles to execute. If the execution time was below a certain threshold, the hardware would force a random number of instructions to execute, effectively breaking the attacker's ability to isolate a single instruction.
The researchers realized that they could fool this heuristic by manipulating the CPU frequency. By using frequency scaling to slow down the victim core, they increased the latency of every instruction. When the victim core runs at 800 MHz instead of 1.8 GHz, the time it takes to execute an instruction increases significantly. Because the Time Stamp Counter (TSC) runs at a constant rate regardless of the core frequency, the attacker can manipulate the core clock to ensure that the execution time of their target instruction exceeds the threshold required to trigger the hardware mitigation. This is a brilliant example of using a side-channel to defeat a defense that relies on timing heuristics.
Real-World Implications for Pentesters
If you are performing a security assessment on a cloud provider or a platform that utilizes confidential computing, you should not assume that the TEE is impenetrable. While this specific attack requires a compromised hypervisor, it is a critical finding for anyone modeling threats in multi-tenant environments. If a cloud provider's management plane is compromised, the isolation guarantees of TDX can be eroded.
During an engagement, look for ways to influence the environment's power management or clock frequency settings. If you can control the environment in which the target VM runs, you can potentially force it into a state where its execution timing becomes predictable or susceptible to these types of microarchitectural leaks. The impact of such an exploit is total loss of confidentiality for the data processed within the Trust Domain.
Defending Against Microarchitectural Leaks
Defending against these attacks is notoriously difficult because they exploit the fundamental design of modern CPUs. The industry is moving toward hardware-level mitigations like the Instruction Counting Single-Step Defense (ICSSD), which replaces timing-based heuristics with performance counters that track instructions retired to retirement. This is a much more robust way to detect single-stepping because it doesn't rely on the variable latency of instruction execution.
If you are a developer or a system architect, ensure that your infrastructure is running the latest firmware and microcode updates. Intel is actively patching these vulnerabilities through the Intel TDX Module, which is the firmware component responsible for enforcing security policies. These updates are not optional; they are the only way to ensure that the hardware-level protections are actually effective against the latest research.
Security research in this space is moving fast. The ability to manipulate execution flow at the cycle level is a powerful capability, and as we continue to push the boundaries of confidential computing, we will undoubtedly see more creative ways to bypass these protections. Keep an eye on the latest NVD entries related to TEEs and microarchitectural side-channels. The next big vulnerability might not be in the software, but in the way the hardware handles the transition between the guest and the host.
Vulnerability Classes
Target Technologies
All Tags
Up Next From This Conference

BestFit: Unveiling Hidden Transformers in Windows ANSI

Wi-Fi Calling: Revealing Downgrade Attacks and Not-so-private Private Keys




