Arm’s Memory Tagging Extensions Need A Helping Hand

Source: The Register Arm’s Memory Tagging Extensions Need A Helping Hand

Say Hello To Speculative Execution Attacks, Again

We’ve been hearing a lot about speculative execution attacks, though until now it’s generally referred to issues with Intel and AMD processors.   Well, it seems Arm can join those two companies out on the very uncomfortable branch after researchers found ways to defeat MTE, which was Arm’s defense against those attacks.  Their research contradicts the findings of Google’s Project Zero, which announced that MTE works perfectly at stopping these sort of attacks.  You’d better hope Google was right, as these researchers claim to be able to defeat MTE 95% of the time, and do it in less than four seconds.

The code is available on GitHub, via a link from the story at The Register if you want to find out the truth.  The flaw is able to define MTE tags via Google Chrome on Android as well as the Linux kernel, once you have those tags you can then attempt to use memory exploits to gain access to the device.  This is just a first step in infection, but once you’ve figured out some of the tags on a device there are a number of exploits you can use.

Keep your eye out for more details as Google and Arm investigate.

Researchers affiliated with Seoul National University in South Korea, Samsung Research, and Georgia Institute of Technology in the US have found that they can break MTE through speculative execution.

Video News

About The Author

Jeremy Hellstrom

Call it K7M.com, AMDMB.com, or PC Perspective, Jeremy has been hanging out and then working with the gang here for years. Apart from the front page you might find him on the BOINC Forums or possibly the Fraggin' Frogs if he has the time.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Podcasts

Archive & Timeline

Previous 12 months
Explore: All The Years!