SLAP and FLOP: Complex vulnerabilities in Apple CPUs
#1
Bug 
Quote:New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.

Researchers from universities in Germany and the U.S. recently showcased an interesting attack — or rather, two attacks — exploiting two different vulnerabilities in Apple CPUs. Picture this: someone sends you a link in a chat. When you click it, nothing looks suspicious at first. It doesn’t ask for your work email password, doesn’t try to get you to download a sketchy file. The page might even contain something fun or useful. But while you’re busy browsing it, hidden code is secretly harvesting data from another browser tab  — checking your location, recent online purchases, and even stealing your emails.

The description of the attack seems simple enough, but in reality, we’re talking about a very complex attack that exploits the features of so-called speculative execution by the CPU.

Wait a minute! Haven’t we heard this before?

You just might have. The core idea of the new attacks resembles various Spectre-type attacks that exploit other, albeit somewhat similar, vulnerabilities in Intel and AMD CPUs. We’ve covered those attacks before. In 2022, four years after the first Spectre vulnerability was discovered, we concluded that there was no realistic, easy, or effective way to exploit those vulnerabilities. Although exploiting these new Apple chip vulnerabilities isn’t straightforward either, the difference this time is that the researchers have already provided fairly realistic attack scenarios and proved their feasibility. To see just how dangerous these vulnerabilities are, let’s briefly recap the basic principles behind all such attacks without getting bogged down in complicated research.

Exploiting speculative execution logic

Speculative execution refers to a situation where the processor executes the next instruction without waiting for the previous one to finish. Let’s draw a somewhat odd yet helpful analogy here with a car. Imagine your car starts the engine automatically every time you approach it. If you’re just passing by, the engine stops (as such, the operation is unnecessary). But if you’re about to set off driving, it’s ready to go as soon as you get in.

Continue Reading...
Reply


Messages In This Thread
SLAP and FLOP: Complex vulnerabilities in Apple CPUs - by harlan4096 - 11 February 25, 09:38

Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Ubuntu 24.04.2 LTS / 24.10
Ubuntu 24.04.2 LTS...harlan4096 — 08:43
Microsoft Defender Antivirus security in...
Microsoft Defender...harlan4096 — 08:41
Microsoft Edge 133.0.3065.82
Version 133.0.3065...harlan4096 — 08:39
Ventoy 1.1.03
Ventoy 1.1.03​ ...harlan4096 — 08:38
AdGuard Browser Extension 5.0.198 (Relea...
AdGuard Browser Ex...harlan4096 — 08:37

[-]
Birthdays
Today's Birthdays
avatar (45)dimaWeami
Upcoming Birthdays
avatar (43)Baihu

[-]
Online Staff
There are no staff members currently online.

>