Over the past few years, hardware manufacturers have developed technologies that ought to make it possible for companies and governmental organizations to process sensitive data securely using shared cloud computing resources. Known as confidential computing, this approach protects sensitive data while it is being processed by isolating it in an area that is impenetrable to other users and even to the cloud provider. But computer scientists at ETH Zurich have now proven that it is possible for hackers to gain access to these systems and to the data stored in them.
The researchers ran two attack scenarios, both using what’s known as the interrupt mechanism, which temporarily disrupts regular processing—for instance to prioritize a different computing task. There are a total of 256 different interrupts, and each one triggers a specific sequence of programming commands.
“Interrupts are a marginal concern, and it appears that ensuring they have systematic safeguards in place has simply been overlooked,” says Shweta Shinde, Professor of Computer Science at ETH Zurich. Together with her Secure & Trustworthy Systems Group, Shinde identified the problematic vulnerabilities in the server hardware used by two leading manufacturers of computer chips, AMD and Intel.
Eavesdrop-proof smartphone project helps find the gaps
Shinde’s team uncovered the security gaps while examining the confidential computing technologies used in AMD and Intel processors. The researchers wanted to gain an in-depth understanding of how these processors function because they are working on an eavesdrop-proof smartphone based on confidential computing.
At the core of confidential computing is the trusted execution environment (TEE). The TEE is a hardware-based component that isolates applications while they are being run. Accessing the application memory is then possible only with an authorized code. This means the data is also protected from unauthorized access while it is being stored, unencrypted, in the working memory during processing. In the past, the only way to ensure such protection was to encrypt data while stored on the hard drive and during transmission.
Instability factor number one: Hypervisors
In the public cloud, applications are isolated using a TEE, specifically from what’s known as a hypervisor. Cloud providers use hypervisor software to manage resources ranging from hardware components to their customers’ virtual servers. Hypervisors are an important part of cloud services because they create the required flexibility, efficiency and security. In addition to managing and optimizing how the underlying hardware is used, they ensure that different users can work securely in separate areas of the same cloud without disturbing each other.
But the administrative functions hypervisors perform are also an instability factor as they open up a variety of attacks. Under certain conditions, these attacks can make it possible to access data stored in the memories of other active cloud users working with the same hardware. Moreover, cloud providers could also use hypervisors to take a peek at their users’ data themselves.
Both these risks are unacceptable to companies and governmental organizations that process sensitive data. Indeed, in an expert report compiled by the Swiss Federal Council, which examined the legal framework for implementing Switzerland’s cloud strategy, unauthorized access to what’s referred to as “data in use” was rated as the most probable risk associated with using a public cloud.
Fully isolating the hypervisor is impossible
There are, however, fundamental limitations as to how well a user system can be isolated and protected from the hypervisor. After all, some communication must take place between the two, and as an administrative tool, the hypervisor still has to be able to perform its core tasks. These include allocating cloud resources and managing the virtual server running the secured system in the cloud.
One of the remaining interfaces between the hypervisor and the TEE concerns the management of interrupts. The ETH team launched what are known as Ahoi attacks to exploit the hypervisor as a means of sending coordinated interrupts to the secured system at any time. This exposes the gap in security: instead of blocking the request from the untrustworthy hypervisor, the TEE lets certain interrupts through. Unaware that these interrupts are coming from outside, the system runs its usual programming routines.
Interrupt heckles knock security off its game
By sending coordinated interrupt heckles, the ETH scientists managed to confuse a TEE-secured system so effectively that they were able to gain root access—in other words, take full control.
“Most affected by this problem was AMD’s confidential computing, which proved vulnerable to attack from several different interrupts. In the case of Intel, only one interrupt door had been left open,” Shinde says in summarizing the results of her “Heckler attack.” The researchers also rated AMD’s previous means of defense as insufficient. The chip manufacturers have since taken steps to address this.
The second attack scenario, known as WeSee, affects AMD hardware only. It exploits a mechanism that the chip manufacturer introduced to make communication between TEE and hypervisor easier despite isolation. In this case, a special interrupt can cause the secured system to divulge sensitive data and even run external programs.
Byproduct on the path to user control of phones
As important as it is to find gaps in the security for sensitive data stored in the public cloud, for Shinde and her research group this was merely a byproduct on the path to ensuring that users of iPhones and Android smartphones retain full control over their data and applications. A specially designed TEE will do more than make sure user data is protected from eavesdropping by the manufacturer’s operating system.
“We also want our TEE to support unmonitored operation of those apps not managed by Apple or Google,” Shinde says.
More information: Benedict Schlüter et al, Heckler: Breaking Confidential VMs with Malicious Interrupts (2024). In: 33rd USENIX Security Symposium (USENIX Security), August 14-16, 2024
Benedict Schlüter et al, WeSee: Using Malicious #VC Interrupts to Break AMD SEV-SNP (2024). In: 45th IEEE Symposium on Security and Privacy (IEEE S&P), May 20-23, 2024.

News
Scientist tackles key roadblock for AI in drug discovery
The drug development pipeline is a costly and lengthy process. Identifying high-quality "hit" compounds—those with high potency, selectivity, and favorable metabolic properties—at the earliest stages is important for reducing cost and accelerating the path [...]
Nanoplastics with environmental coatings can sneak past the skin’s defenses
Plastic is ubiquitous in the modern world, and it's notorious for taking a long time to completely break down in the environment - if it ever does. But even without breaking down completely, plastic [...]
Chernobyl scientists discover black fungus feeding on deadly radiation
It looks pretty sinister, but it might actually be incredibly helpful When reactor number four in Chernobyl exploded, it triggered the worst nuclear disaster in history, one which the surrounding area still has not [...]
Long COVID Is Taking A Silent Toll On Mental Health, Here’s What Experts Say
Months after recovering from COVID-19, many people continue to feel unwell. They speak of exhaustion that doesn’t fade, difficulty breathing, or an unsettling mental haze. What’s becoming increasingly clear is that recovery from the [...]
Study Delivers Cancer Drugs Directly to the Tumor Nucleus
A new peptide-based nanotube treatment sneaks chemo into drug-resistant cancer cells, providing a unique workaround to one of oncology’s toughest hurdles. CiQUS researchers have developed a novel molecular strategy that allows a chemotherapy drug to [...]
Scientists Begin $14.2 Million Project To Decode the Body’s “Hidden Sixth Sense”
An NIH-supported initiative seeks to unravel how the nervous system tracks and regulates the body’s internal organs. How does your brain recognize when it’s time to take a breath, when your blood pressure has [...]
Scientists Discover a New Form of Ice That Shouldn’t Exist
Researchers at the European XFEL and DESY are investigating unusual forms of ice that can exist at room temperature when subjected to extreme pressure. Ice comes in many forms, even when made of nothing but water [...]
Nobel-winning, tiny ‘sponge crystals’ with an astonishing amount of inner space
The 2025 Nobel Prize in chemistry was awarded to Richard Robson, Susumu Kitagawa and Omar Yaghi on Oct. 8, 2025, for the development of metal-organic frameworks, or MOFs, which are tunable crystal structures with extremely [...]
Harnessing Green-Synthesized Nanoparticles for Water Purification
A new review reveals how plant- and microbe-derived nanoparticles can power next-gen water disinfection, delivering cleaner, safer water without the environmental cost of traditional treatments. A recent review published in Nanomaterials highlights the potential of green-synthesized nanomaterials (GSNMs) in [...]
Brainstem damage found to be behind long-lasting effects of severe Covid-19
Damage to the brainstem - the brain's 'control center' - is behind long-lasting physical and psychiatric effects of severe Covid-19 infection, a study suggests. Using ultra-high-resolution scanners that can see the living brain in [...]
CT scan changes over one year predict outcomes in fibrotic lung disease
Researchers at National Jewish Health have shown that subtle increases in lung scarring, detected by an artificial intelligence-based tool on CT scans taken one year apart, are associated with disease progression and survival in [...]
AI Spots Hidden Signs of Disease Before Symptoms Appear
Researchers suggest that examining the inner workings of cells more closely could help physicians detect diseases earlier and more accurately match patients with effective therapies. Researchers at McGill University have created an artificial intelligence tool capable of uncovering [...]
Breakthrough Blood Test Detects Head and Neck Cancer up to 10 Years Before Symptoms
Mass General Brigham’s HPV-DeepSeek test enables much earlier cancer detection through a blood sample, creating a new opportunity for screening HPV-related head and neck cancers. Human papillomavirus (HPV) is responsible for about 70% of [...]
Study of 86 chikungunya outbreaks reveals unpredictability in size and severity
The symptoms come on quickly—acute fever, followed by debilitating joint pain that can last for months. Though rarely fatal, the chikungunya virus, a mosquito-borne illness, can be particularly severe for high-risk individuals, including newborns and older [...]
Tiny Fat Messengers May Link Obesity to Alzheimer’s Plaque Buildup
Summary: A groundbreaking study reveals how obesity may drive Alzheimer’s disease through tiny messengers called extracellular vesicles released from fat tissue. These vesicles carry lipids that alter how quickly amyloid-β plaques form, a hallmark of [...]
Ozone exposure weakens lung function and reshapes the oral microbiome
Scientists reveal that short-term ozone inhalation doesn’t just harm the lungs; it reshapes the microbes in your mouth, with men facing the greatest risks. Ozone is a toxic environmental pollutant with wide-ranging effects on [...]