Battering RAM: Low-Cost Interposer Attacks on Confidential Computing