Florian Sieck

PhD student @ University of Lübeck / Institute for IT-Security

2024-10-08

Intel fixed the single-stepping detection heuristic but not the prevention mode, see intel.com/content/www/us/en/se for their announcement. OpenSSL and wolfSSL also patched the vulnerabilites.
Check out uzl-its.github.io/tdxdown/ if you want to learn more about #TDXdown.

2024-10-08

We break Intel TDX’s single-stepping countermeasure that splits into a detection heuristic and a single-stepping prevention mode. Moreover, we systematically analyze ECDSA nonce truncation and present end-to-end attacks against wolfSSL and OpenSSL.

2024-10-08

Lifting the curtain on the first attack on Intel TDX: #TDXdown. Our paper “TDXdown: Single-Stepping and Instruction Counting Attacks against Intel TDX” has been accepted @acm_ccs 2024. #TDXdown is joint work with @lucaw and Thomas Eisenbarth

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst