当前位置:网站首页>MIT found a new hardware vulnerability in Apple M1: it can break the security mechanism without leaving a trace
MIT found a new hardware vulnerability in Apple M1: it can break the security mechanism without leaving a trace
2022-06-13 12:23:00 【Open source China Information】
MIT Computer Science and artificial intelligence lab (CSAIL) The scientists of have released a The study says , They found a way to bypass Apple M1 CPU A new hardware attack of pointer verification mechanism on , be called PACMAN.
According to the introduction ,M1 The chip uses the function of pointer authentication , This function is the last line of defense against typical software vulnerabilities . After enabling pointer Authentication , Vulnerabilities that usually compromise the system or disclose private information will be intercepted on its track . at present , Apple is already in its all based on ARM The pointer authentication is implemented on the custom chip of .
and MIT This newly discovered vulnerability , You can break through this last line of defense without leaving a trace . Besides , Whereas PACMAN Using the hardware mechanism , So there are no software patches that can fix it .MIT Aspect representation , Apple M2 The chip also supports pointer authentication , But they haven't tested it yet .

The study points out that , An attacker can guess the pointer authentication code (Pointer Authentication Code,PAC) And disable it to implement PACMAN attack .PAC Is an encrypted signature , It can be used to confirm whether an application has been tampered with maliciously . It is not difficult to guess the correct value , Attackers can get through hardware side channel To test the correctness of the guess .“ Whereas PAC There are only so many possible values , They found that they could try all the values to find the correct value ”. most important of all , Because guesswork happens under the execution of guesswork , So the attack leaves no trace .
“ The idea behind pointer authentication is , If all the other methods fail , You can still rely on it to prevent attackers from controlling your system . We have proven that , As the last line of defense, pointer authentication is not as absolute as we once thought . When pointer authentication is introduced , A large category bug Suddenly it becomes more difficult to attack . And with the PACMAN Accentuate these bug Severity of , The overall attack surface may be larger .”
however ,PACMAN It doesn't completely bypass M1 All the security facilities on the chip ; It can only exploit existing vulnerabilities that pointer authentication can prevent , And by finding the right PAC To unlock the true potential of the vulnerability in the attack . Due to PACMAN Cannot destroy the system without existing software errors , So the researchers think that people don't have to panic .“ up to now , No one has taken advantage of PACMAN Create an end-to-end attack .”
It is worth noting that , Pointer authentication is mainly used to protect the core operating system kernel . The study points out that ,PACMAN The attack is even effective against the kernel , this “ For all enabled pointer authentication ARM The future safety work on the system has a significant impact . In the future CPU Designers should take this attack into account when building future security systems , Developers should be careful not to rely solely on pointer authentication to protect their software .”
MIT CSAIL Plan in 6 month 18 This research was formally introduced at the International Symposium on computer architecture . Apple issued a statement after learning of the discovery Express ,“ We would like to thank the researchers for their cooperation , Because this proof of concept advances our understanding of these technologies . Based on our analysis and the details shared with us , We came to the conclusion that , This problem does not pose a direct risk to our users , And it is not enough to bypass the security protection of the operating system .”
边栏推荐
- 行业领先的界面组件包DevExpress 6月正式发布v21.2.8
- Tamigou equity project sharing: transfer of 1637900 shares of Beijing Huadahua New Technology Co., Ltd
- Interpretation of cube technology | past and present life of cube Rendering Design
- Machine learning (III) - LDA (linear discriminant analysis) theory and code explanation
- SaaS应用架构的最佳实践
- Web developer, web development background development
- 小程序配置分享的一种实践
- Based on STM32F103 - matrix key + serial port printing
- 基于STM32F103——矩阵按键+串口打印
- 递归及归并排序
猜你喜欢

Seccloud and trend technology jointly release the overall solution of container cloud platform and GPU resource pooling

CICA security involved in the enrollment storm of the contract School: the liquidated damages were only 3000 yuan. The lawyer said that the enterprise should compensate for reasonable expenses
![[tcaplusdb knowledge base] Introduction to tcaplusdb tcapulogmgr tool (I)](/img/46/e4a85bffa4b135fcd9a8923e10f69f.png)
[tcaplusdb knowledge base] Introduction to tcaplusdb tcapulogmgr tool (I)

Product story | YuQue drawing board you don't know

Committed to R & D and manufacturing of ultra surface photonic chip products, Shanhe optoelectronics completed a round of pre-A financing of tens of millions of yuan

Web development project, web single page development

2022年二建《公路》科目答案已出,请收好

Based on STM32F103 - DS1302 date time + serial port printing
![[tcapulusdb knowledge base] Introduction to tcapulusdb tcapsvrmgr tool (I)](/img/1b/92cbe7050580a0124a82f70dd3ca21.png)
[tcapulusdb knowledge base] Introduction to tcapulusdb tcapsvrmgr tool (I)

7. Introduction to field sensing decomposing machine FFM
随机推荐
Camunda定时器事件示例Demo(Timer Events)
【MySQL锁表处理】
A practice of sharing applet configuration
Product story | YuQue drawing board you don't know
What if the second construction fails to pass the post qualification examination? This article tells you
面试突击56:聚簇索引和非聚簇索引有什么区别?
5 locksupport and thread interruption
Solution case of adding illegal snapshots when the website is invaded
10、DCN 介绍
The beginning of everything, test girl
M1 体验win11
基于STM32F103——SIM900A发送短信+串口打印
业务上云的方法论
SaaS应用架构的最佳实践
Based on STM32F103 - matrix key + serial port printing
2022年二建《市政》科目答案已出,请收好
CVPR2022 | A ConvNet for the 2020s & 如何设计神经网络总结
Seccloud and trend technology jointly release the overall solution of container cloud platform and GPU resource pooling
Interview shock 56: what is the difference between clustered index and non clustered index?
行业领先的界面组件包DevExpress 6月正式发布v21.2.8