TRAIL OF BITS
Powered by

After Wiretap and Battering RAM: What Changes for TEE-Based Blockchain Infrastructure

NOV

6

Thursday, November 6

5:00 PM - 5:45 PM

Register

Recent research has revealed that physical attacks on Intel SGX and AMD SEV-SNP are possible when a party is able to attach an interposer to DDR4 RAM. These findings have raised important questions about the practical limits of trusted execution environments (TEEs) as the foundation for secure, privacy-preserving computation.

While hardware vendors have confirmed that these vulnerabilities will not be patched, the implications extend beyond any single exploit. They highlight the need to rethink where trust is placed — and how layered designs can continue to provide strong privacy guarantees, even in imperfect environments.

Join Tjaden Hess, Principal Security Engineer at **Trail of Bits **and Andy Campbell, Head of Product at Applied Blockchain / Silent Data, as they unpack what these discoveries mean for teams building on TEEs today.

Together, they'll explore how projects can adapt through secure architectures, layered privacy models, and resilient attestation approaches — keeping confidentiality and trust at the core of next-generation blockchain infrastructure.

Speakers

Tjaden Hess

Tjaden Hess

Principal Security Engineer, Cryptography

Andy Campbell

Andy Campbell

Head of Product, Applied Blockchain

NOV

6

Thursday, November 6

5:00 PM - 5:45 PM

Register