Researchers from Belgium's KU Leuven University have developed a groundbreaking hardware attack named "Battering RAM" that effectively breaks the security model of modern confidential computing. Presented at Black Hat Europe 2025, the attack uses a low-cost, custom-made hardware device to bypass the memory encryption protections of Intel Software Guard Extensions (SGX) and AMD Secure Encrypted Virtualization (SEV). This technique grants attackers with physical access arbitrary read/write capabilities within supposedly secure memory enclaves, fundamentally challenging the security promises of encrypted memory in cloud and edge computing environments. The attack cannot be detected by software and circumvents existing firmware mitigations.
This attack is significant because it operates at the hardware level during runtime, making it invisible to software-based detection and immune to recent firmware patches designed to stop software-based memory aliasing attacks.
The Battering RAM interposer works by performing a sophisticated Man-in-the-Middle (MitM) attack on the physical memory bus. When the CPU requests data from a specific memory address, the interposer intercepts this request and subtly alters the address lines. This causes the DRAM to return data from a different, protected location (e.g., inside an SGX enclave), which the CPU then decrypts, believing it to be legitimate, non-sensitive data. The researchers demonstrated this by achieving:
This technique effectively nullifies the protections against physical attacks like T1084 - Hardware Additions and cold boot attacks, as it can extract data from live, running systems.
The implications of Battering RAM are profound, particularly for the cloud computing industry, which relies heavily on confidential computing to offer secure processing environments to customers.
Detection is currently considered impossible through software means. The attack leaves no trace in logs or system state that can be monitored by an OS or hypervisor.
Response must focus on prevention through physical and supply chain security:
Since software patches are ineffective, mitigation is entirely procedural and strategic.
Enforce strict physical security and supply chain integrity to prevent the introduction of malicious hardware components.
Mapped D3FEND Techniques:
While this attack operates at runtime, maintaining a strong boot integrity chain can help ensure the system starts in a known-good state, though it won't prevent the runtime manipulation.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats