Thứ Hai, Tháng Hai 6, 2023
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z
No Result
View All Result
NATuts
No Result
View All Result
Home Tech

MIT researchers discover new bugs in unpatched Apple M1 CPUs

12 Tháng Sáu, 2022
in Tech
0
MIT researchers discover new bugs in unpatched Apple M1 CPUs
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter

Các bài viết liên quan:

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022

Apple M1 . CPU

A new hardware attack is voiced PACMAN proven against Apple’s M1 processor chipset, capable of equipping a malicious actor with the ability to execute arbitrary code on a macOS system.

MIT researchers Joseph Ravichandran, Weon Taek Na, Jay Lang, and Mengjia Yan say it leverages “speculative execution attacks to bypass a critical memory defense mechanism, ARM Pointer Validation , a security feature used to enforce pointer integrity”.

The researchers added, “while the hardware mechanisms used by PACMAN cannot be patched with software features, memory failures can still occur.”

The vulnerability stems from pointer validation (PAC) code, a line of defense introduced in the arm64e architecture to detect and secure against unwanted changes to pointers – stored objects. store memory addresses – in memory.

PACs aim to solve a common problem in software security, such as a memory security vulnerability, which is often exploited by overwriting control data in memory (i.e. pointers) to convert directs code execution to an arbitrary location controlled by the attacker.

Although strategies such as address space layout randomization (ASLR) have been devised to increase the difficulty of performing buffer overflow attacks, the goal of PAC is to determine the “validity of pointers with minimal size and performance impact”, effectively preventing an adversary from creating pointers for use in an exploit.

This is achieved by protecting a pointer with a cryptographic hash – known as a Pointer Validation Token (PAC) – to ensure its integrity. Apple explains the PAC as follows:

Pointer validation works by providing a special CPU instruction that adds a cryptographic signature – or PAC – to the unused high-order bits of the pointer before storing the pointer. Another instruction clears and validates the signature after re-reading the pointer from memory. Any change to the stored value between write and read will invalidate the signature. The CPU interprets the validation error as memory corruption and places a high-order bit in the pointer, making the pointer invalid and causing an application error.

Apple M1 . CPU

But PACMAN “removes the main barrier to conducting control-flow hijacking attacks on a protected platform using pointer validation.” It combines memory corruption and speculative execution to circumvent the security feature, leaking “PAC verification results over microarchitecture side channels without causing any problems.”

In short, the attack method makes it possible to distinguish between correct PACs and incorrect hashes, allowing the bad guys to “brute-force the correct PAC value while preventing crashes and building a hijacking attack.” Control-flow control on a PA is enabled by the victim program or the operating system. “

For its part, the crash prevention succeeds because each PAC value is guessed at guessing by time-based sub-channel mining through a translation look-to-side buffer (CTR) using a Prime attack. + Probe.

Speculative execution vulnerabilities, as observed in the Specter and Meltdown cases, weaponize out-of-order execution, a technique used to improve performance in modern microprocessors by how to predict the most likely path of program execution flow.

It is worth noting, however, that the threat model assumes that an exploitable memory corruption vulnerability already exists in the victim program (kernel), thus allowing an attacker to privileged (a malicious application) injects rogue code into certain memory locations in the victim process.

This attack has important implications for designers looking to implement future processors with pointer validation and has broad implications for security, the researchers conclude. confidentiality of future control-flow integrity primitives”.

.

Previous Post

Download JetBrains GoLand 2022 Full Crack

Next Post

6 things you need to know about intellectual property

Megusta

Megusta

Related Posts

5 Best Software to Stream Games

5 Best Software to Stream Games

2 Tháng Một, 2023
Top 10 CRM Software For Construction 

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
Instruction how to use OBS streaming software

Features, settings and how to use OBS streaming software through 9 simple steps

25 Tháng Mười Hai, 2022
What is Trans woman?  What is Transgender Women?

What is Trans woman? What is Transgender Women?

23 Tháng Mười Hai, 2022
Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

Christmas gift: Genuine Windows 10 Pro for only $6.63 and Office 2021 for $14.22

22 Tháng Mười Hai, 2022
How to get 50 free coins of SkyJoy App to redeem

How to get 50 free coins of SkyJoy App to redeem

21 Tháng Mười Hai, 2022
Load More
Next Post
6 things you need to know about intellectual property

6 things you need to know about intellectual property

Trả lời Hủy

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *

Bài viết mới

How to get travel insurance
Đời sống

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly
Phần mềm

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023
5 Best Software to Stream Games
Software

5 Best Software to Stream Games

2 Tháng Một, 2023
IBM Bridge To Cloud For Power
Software

IBM Bridge To Cloud For Power- Everything You Should Know

2 Tháng Một, 2023
Top 10 CRM Software For Construction 
Tech

Top 10 CRM Software For Construction Enterprises All The Time

31 Tháng Mười Hai, 2022
What Is IBM Software
Software

What Is IBM Software? 4 Business Segments at IBM You Should Know

26 Tháng Mười Hai, 2022
W3Schools

Ads

Contact: [email protected]

DMCA.com Protection Status

Categories

  • Android
  • Cạm bẫy tâm lí
  • Chưa được phân loại
  • Đồ họa
  • Đời sống
  • Gen Z
  • Health
  • iOS
  • Kĩ năng mềm
  • News
  • Nhà mạng
  • Phần mềm
  • Phần mềm đồ họa
  • Review sách
  • Software
  • Tech
  • Thiết kế ảnh
  • Thiết kế video
  • Thủ thuật
  • Travel
  • Văn hóa Nam Bộ
  • Văn học
  • Window

Browse by Tag

ai là triệu phú android Apple browser Bullet Journal bản thân chai pin Chỉnh ảnh data domain download fshare game game show giả lập màu hosting IKEA ios khuyến mãi kinh doanh kiến thức kiểm tra pin messenger miễn phí mua sắm Máy ảnh mạng network nghệ thuật ngôn ngữ nhà Trần pin laptop quảng cáo tiếng anh trạng thái Trần Thủ Độ tên miền tắt hoạt động từ vựng video viettel window 10 word zalo Đơn giản

Recent News

How to get travel insurance

Guide on how to get travel insurance with 4 options

24 Tháng Một, 2023
Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

Software Asset Management for Websites: How to Keep Your Sites Running Smoothly

8 Tháng Một, 2023

Trang tin nóng hổi - vừa thổi vừa xem

No Result
View All Result
  • Home
  • Health
  • News
  • Software
  • Tech
  • Travel
  • Gen Z

Trang tin nóng hổi - vừa thổi vừa xem