Abstract
Trusted execution environments (TEEs) protect applications running inside of them from untrusted host systems. The host can not access or modify the memory of applications protected by a TEE. Intel TDX is a recently introduced TEE that allows for the execution of arbitrary code, including entire operating systems, inside a protected environment. Prior work has attacked AMD SEV-SNP, AMD’s counterpart to Intel TDX, using performance counters, by leaking sensitive information through them, e.g., which branches are taken. Intel TDX is thought not to be affected by such attacks, as it disables performance counters when entering the protected guests (TDs) to mitigate these attacks.
In this paper, we bypass the protections of Intel TDX, allowing us to not only recover secrets, such as private keys, but also expand on what is thought possible by leaking arbitrary memory using performance counters. We analyze available performance counters on the recent Intel Emerald Rapids microarchitecture, finding 8 that track events for the whole physical core and not just the current logical core. We use this to bypass the Intel TDX mitigation against performance counter-based attacks by monitoring TDs from the sibling logical core. One of these counters tracks uOPs executed, allowing an attacker to gain valuable insight into victim TDs. Using this information, we recover an RSA-2048 private key from a TD running MbedTLS with an average edit distance of only 0.92 bits. Furthermore, we discover that this performance counter includes speculatively executed uOPs, enabling the use of a large number of previously unusable Spectre compare gadgets in Spectre attacks. With this discovery, we leak TD memory at a rate of 52.6 bit/s and break KASLR in less than 2 s . Finally, we break the recently introduced inter-keystroke timing defense of OpenSSH, allowing us to detect real keystrokes with an 𝐹1 score of 99.6 %.
In this paper, we bypass the protections of Intel TDX, allowing us to not only recover secrets, such as private keys, but also expand on what is thought possible by leaking arbitrary memory using performance counters. We analyze available performance counters on the recent Intel Emerald Rapids microarchitecture, finding 8 that track events for the whole physical core and not just the current logical core. We use this to bypass the Intel TDX mitigation against performance counter-based attacks by monitoring TDs from the sibling logical core. One of these counters tracks uOPs executed, allowing an attacker to gain valuable insight into victim TDs. Using this information, we recover an RSA-2048 private key from a TD running MbedTLS with an average edit distance of only 0.92 bits. Furthermore, we discover that this performance counter includes speculatively executed uOPs, enabling the use of a large number of previously unusable Spectre compare gadgets in Spectre attacks. With this discovery, we leak TD memory at a rate of 52.6 bit/s and break KASLR in less than 2 s . Finally, we break the recently introduced inter-keystroke timing defense of OpenSSH, allowing us to detect real keystrokes with an 𝐹1 score of 99.6 %.
| Original language | English |
|---|---|
| Title of host publication | ACM Asia Conference on Computer and Communications Security (ASIA CCS ’26) |
| Publisher | Association for Computing Machinery (ACM) |
| ISBN (Electronic) | 979-8-4007-2356-8 |
| DOIs | |
| Publication status | Published - 1 Jun 2026 |
| Event | ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2026 - Bangalore, India Duration: 1 Jun 2026 → 5 Jun 2026 |
Conference
| Conference | ACM ASIA Conference on Computer and Communications Security, ASIA CCS 2026 |
|---|---|
| Abbreviated title | ASIA CCS 2026 |
| Country/Territory | India |
| City | Bangalore |
| Period | 1/06/26 → 5/06/26 |
Keywords
- Intel TDX
- Side Channel
- Performance Counter
- TEE
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Dive into the research topics of 'TELESCOPE: TDX Exploit Leaking Encrypted Data using Sibling Core Performance Counters'. Together they form a unique fingerprint.Projects
- 2 Active
-
EU - FSSec - Foundations for Sustainable Security
Gruss, D. (Project manager on research unit)
1/03/23 → 29/02/28
Project: Research project
-
Special Research Area (SFB) F85 Semantic and Cryptographic Foundations of Security and Privacy by Compositional Design
Mangard, S. (Project manager on research unit)
1/01/23 → 31/12/26
Project: Research project
Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS