In the News
Battering RAM (2026)
- VRTnws: Onderzoekers KU Leuven hacken hyperbeveiligde cloudsoftware met paneeltje van 50 euro: "Zeker niet zomaar afgaan op de beweringen van technologiebedrijven"
- ROBtv: Onderzoekers KU Leuven hacken beveiligingstechnologie: "Bedrijven moeten bewust zijn van de kwetsbaarheid"
- DataNews: Onderzoekers KULeuven hacken geavanceerde cloudbeveiliging Intel en AMD
- De Tijd: Leuvense onderzoekers kraken beveiligde servers van techreuzen met amper 50 euro
- HLN: Hardwaremodule van nog geen 50 euro omzeilt meest geavanceerde cloudbeveiliging
- Ars Technica: Intel and AMD trusted enclaves, a foundation for network security, fall to physical attacks
- The Hacker News: New $50 Battering RAM Attack Breaks Intel and AMD Cloud Security Protections
- Security Week: Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device
- KU Leuven: KU Leuven research exposes fundamental hardware flaw in highly protected cloud servers
BadRAM (2025)
- DataNews: KU Leuven legt kwetsbaarheden in AMD-processoren bloot
- De Tijd: Leuvense onderzoekers kraken beveiliging AMD-chips
- Heise: BadRAM: Historical side channel undermines confidential computing in the cloud
- Ars Technica: AMD’s trusted execution environment blown wide open by new BadRAM attack
- The Register: AMD secure VM tech undone by DRAM meddling
- Tom's Hardware: BadRAM attack breaches AMD secure VMs using a Raspberry Pi Pico, DDR socket, and a 9V battery
- Security Week: BadRAM Attack Uses $10 Equipment to Break AMD Processor Protections
- KU Leuven: International research team uncovers vulnerability in cloud server security
AEX-Notify (2023)
LVI (2020)
- DataNews: KU Leuven ontdekt nieuwe kwetsbaarheid in Intel-chips
- Tweakers: LVI-kwetsbaarheid in Intel-cpu's treft SGX en is niet op te lossen met microcode
- Ars Technica: Intel SGX is vulnerable to an unfixable flaw that can steal crypto keys and more
- The Hacker News: LVI Attacks: New Intel CPU Vulnerability Puts Data Centers At Risk
- The Register: Meltdown The Sequel strikes Intel chips – and full mitigation against data-meddling LVI flaw will slash performance
- Tom's Hardware: New Load Value Injection Vulnerability Found In Intel Chips
- ZDNet: Intel CPUs vulnerable to new LVI attacks
- Security Week: Load Value Injection: Intel CPUs Vulnerable to Reverse Meltdown Attack
- TechCrunch: New flaw in Intel chips lets attackers slip their own data into secure enclave
- Phoronix: Load Value Injection
- KU Leuven: Intel processors are still vulnerable to attack
Plundervolt (2020)
- DataNews: KU Leuven ontdekt veiligheidslek in Intel Core processors
- Wired: Hackers Can Mess With Voltages to Steal Intel Chips' Secrets
- Ars Technica: Intel’s SGX coughs up crypto keys when scientists tweak CPU voltage
- The Hacker News: New PlunderVolt Attack Targets Intel SGX Enclaves by Tweaking CPU Voltage
- Tom's Hardware: Plundervolt: New Attack Targets Intel's Overclocking Mechanisms
- Security Week: Plundervolt Attack Uses Voltage to Steal Data From Intel Chips
- TechCrunch: 'Plundervolt' attack breaches chip security with a shock to the system
- KU Leuven: Plundervolt exposes vulnerability in security technology of Intel processors
T2W (2019)
ZombieLoad (2019)
- De Standaard: Hackers raken in hart van Intel-processor
- BBC: Intel Zombieload bug fix to slow data centre computers
- Fortune: Intel 'Zombieload' Chip Flaw Lets Hackers Steal Secrets
- The Verge: ZombieLoad attack lets hackers steal data from Intel chips
- Wired: Intel Flaw Lets Hackers Siphon Secrets from Millions of PCs
- Ars Technica: New speculative execution bug leaks data from Intel chips’ internal buffers
- ZDNet: MDS 'Zombieload' attacks against Intel CPUs: What's your patch status?
- Security Week: New Class of Vulnerabilities Leak Data From Intel Chips
- KU Leuven: Computer scientists discover a critical vulnerability in Intel processors
Transient SoK (2019)
- Ars Technica: Spectre, Meltdown researchers unveil 7 more speculative execution attacks
- Security Week: Researchers Disclose 7 New Meltdown, Spectre Attacks
Foreshadow (2018)
- VRTnws: Onderzoekers KU Leuven ontdekken groot veiligheidslek in computerchips van Intel
- De Morgen: Lek in beveiliging processoren van Intel ontdekt door onderzoekers KU Leuven
- DataNews: Alweer ernstig beveiligingsprobleem in Intel-processoren ontdekt
- De Tijd: Onderzoekers KU Leuven kraken beveiliging Intel-processor
- BBC: 'Foreshadow' attack affects Intel chips
- Wired: 'Foreshadow' Flaw Undermines the Intel CPU Secure Enclave
- Ars Technica: Intel’s SGX blown wide open by, you guessed it, a speculative execution attack
- The Hacker News: Foreshadow Attacks — 3 New Intel CPU Side-Channel Flaws Discovered
- The Register: Foreshadow and Intel SGX software attestation: 'The whole trust model collapses'
- Tom's Hardware: Intel Chips' List of Security Flaws Grows (Updated)
- ZDNet: Beyond Spectre: Foreshadow, a new Intel security problem
- Security Week: Foreshadow/L1TF: What You Need to Know
- PC World: Foreshadow L1TF attacks Intel CPUs with Spectre-like tactics
- Red Hat: Understanding L1 Terminal Fault aka Foreshadow: What you need to know
- KU Leuven: Modern security technology in Intel processors not watertight