Gadget Page
No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming
PRICING
SUBSCRIBE
  • Home
  • Apps
  • Gadget Info
  • Gaming
No Result
View All Result
Gadget Page
No Result
View All Result
Home Uncategorized

MIT researchers have discovered a new bug in the Apple M1 CPU that cannot be patched

gadgetpage by gadgetpage
June 11, 2022
Reading Time: 5 mins read
0
MIT researchers have discovered a new bug in the Apple M1 CPU that cannot be patched

RELATED POSTS

Puedes descargar Age of Empires III gratis y legalmente

Vanessa Kirby will play Sue Storm in Fantastic Four

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt


Dub a fancy hardware attack Pacman Demonstrated against Apple’s M1 processor chipset, potentially arming a malicious actor with the ability to gain arbitrary code execution on the MacOS system.

It “exploits hypothetical execution attacks to bypass an important memory protection system, ARM pointer authentication, a security feature used to enforce pointer integrity,” said MIT researchers Joseph Ravichandran, Wayne Taek Na, J Lang and Menzia Ian. Says In a new paper.

More worryingly, “although the hardware processes used by PACMAN cannot be patched with software features, there may be bugs of memory corruption,” the researchers added.

Weakness pointers are contained in the authentication code (PACsA defense line introduced in the arm64e architecture aimed at detecting and protecting against unforeseen changes. Indicative – The object that stores a memory address – in memory.

Cyber ​​security

PACs target a common problem with software security, such as memory corruption vulnerabilities, which often overwrite control data in memory (i.e., pointers) by redirecting code execution to an arbitrary location controlled by the attacker.

Strategies such as address space layout randomization (ASLR) Built to increase the difficulty of performing buffer overflow attacks, PAC aims to ensure “legitimacy of pointers with minimal size and performance effects”, effectively preventing adversaries from creating valid pointers for use in an exploit.

This is achieved by securing a pointer with a cryptographic hash – called a pointer authentication code (PAC) – to ensure its integrity. Apples Explains PACs as follows –

Pointer authentication works with a special CPU instruction to add a cryptographic signature – or PAC – to a pointer’s unused high-order bits before saving the pointer. Another instruction removes the signature after reading the pointer from memory and validates it. Any change in the stored value between reading and writing invalidates the signature. The CPU interprets authentication failure as memory corruption and sets a high-order bit on the pointer, invalidating the pointer and crashing the app.

Apple M1 CPUs

But PACMAN “removes the initial hurdle of conducting control-flow hijacking attacks on a secure platform using pointer authentication.” It combines memory corruption and speculative performance to prevent security features, “leaking the results of PAC verification through the microarchitectural side channel without causing any crashes.”

The attack method, in short, makes it possible to distinguish between a correct PAC and an incorrect hash, allowing a bad actor to “brutally emphasize the correct PAC value while suppressing crashes and create a PA-capable control-flow hijacking attack” victim program or operating System. “

Cyber ​​security

Crash prevention, in part, is successful because each PAC value is approximated using a time-based side channel via a translation look-side buffer.TLB) Using a prime + probe attack.

Weakness of speculative execution in the case of Specter and Meltdown, makes weapons The death penalty is out of orderA technique used to improve the performance of modern microprocessors Prophecy The most probable way to execute a program.

However, it is worth noting that the threat model assumes that a victim program (kernel) already has an exploitative memory corruption vulnerability, which, in turn, allows the unauthorized attacker (a malicious app) to inject malicious code into specific memory locations. The hunting process.

“This attack has significant implications for designers seeking to implement future processors with pointer authentication, and future control-flow integrity has far-reaching implications for primitive security,” the researchers concluded.





Source link

Share this:

  • Twitter
  • Facebook
Tags: computer securitycyber attackcyber newscyber security newscyber security news todayCyber ​​Security UpdateCyber ​​updatedata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilities
ShareTweetPin
gadgetpage

gadgetpage

Related Posts

Puedes descargar Age of Empires III gratis y legalmente
Uncategorized

Puedes descargar Age of Empires III gratis y legalmente

August 4, 2023
Vanessa Kirby will play Sue Storm in Fantastic Four
Uncategorized

Vanessa Kirby will play Sue Storm in Fantastic Four

August 4, 2023
Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt
Uncategorized

Tower of Fantasy: Einjähriges Jubiläum und großes Update 3.1 angekündigt

August 3, 2023
OLED-Roadmap 2024: Monitorhersteller gibt Einblicke
Uncategorized

OLED-Roadmap 2024: Monitorhersteller gibt Einblicke

August 2, 2023
Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com
Uncategorized

Samsung Galaxy SmartTag 2: Zertifizierung zeigt neues Design – Allround-PC.com

August 2, 2023
Samsung Galaxy S23 FE: Neue Details zur Kamera
Uncategorized

Samsung Galaxy S23 FE: Neue Details zur Kamera

August 2, 2023
Next Post
Play with little – Cute Soulslike 50% off

Play with little - Cute Soulslike 50% off

IOS 16 Rises in the Name of Customization: News for Memoji – Cellular.it

IOS 16 Rises in the Name of Customization: News for Memoji - Cellular.it

Recommended Stories

Hackers for hire target victims with cyber espionage campaign

Hackers for hire target victims with cyber espionage campaign

November 12, 2020
The True Cost of Having Connected Home Gym Equipment | Digital Trends

The True Cost of Having Connected Home Gym Equipment | Digital Trends

November 22, 2020

Finally, Seth is eligible to play at Lord’s Switch

July 2, 2022

Popular Stories

  • Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    Xiaomi 13T is said to have a flagship camera on board – macro rubbish thrown away

    0 shares
    Share 0 Tweet 0
  • Gamescom 2023: Asus Republic of Gamers event with new products and contests

    0 shares
    Share 0 Tweet 0
  • Horizon Forbidden West, new major event: all accounts

    0 shares
    Share 0 Tweet 0
  • iPhone 12 mini Review | Trusted Reviews

    0 shares
    Share 0 Tweet 0
  • Sony Crystal LED Display System – LED Wall for Film Sets | CineD

    0 shares
    Share 0 Tweet 0
  • Home
  • Apps
  • Gadget Info
  • Gaming
Call us: +1 234 JEG THEME

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

No Result
View All Result
  • Home
  • Apps
  • Gadget Info
  • Gaming

© 2023 JNews - Premium WordPress news & magazine theme by Jegtheme.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?