📄️ Hardware attacks
Learn about physical attacks on TEE chips including ÆPIC Leak, VoltPillager voltage fault injection, and laser fault injection, along with their mitigations.
📄️ Software attacks
Explore software-based attacks on TEEs like Foreshadow and SGAxe that exploit bugs in enclave firmware or runtime environments, and understand available mitigations.
📄️ Side-channel attacks
Discover side-channel attacks like WireTap, SGX-Step, and CacheZoom that infer secrets by observing TEE behavior through timing, power, and electromagnetic emissions.
📄️ Mitigations
Understand Proof of Cloud, a defense-in-depth framework that verifies physical infrastructure integrity through human-assisted, automated, and continuous monitoring.