Linux

researchers find an unfixable bug in EVERY ARM cpu



ARM is a great computer architecture with some great security features. In this video we talk about TikTag, a new attack that shows how one can use speculative execution to see the future.

🏫 COURSES 🏫 Learn to code in C at

πŸ›’ GREAT BOOKS FOR THE LOWEST LEVELπŸ›’
Blue Fox: Arm Assembly Internals and Reverse Engineering:
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation :
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software :
The Ghidra Book: The Definitive Guide:

πŸ”₯ SOCIALS πŸ”₯
Come hang out at

[ad_2]

source

Related Articles

49 Comments

  1. Can we please stop using the phrase: "broke the internet" nothing which was decribed with this phrase came even close to breaking the internet. People really dont know how uninteresting they are to the world

  2. Speculative execution is a little more than prefetching. Besides that if you want to keep learning and growing, the Linux System Group at Microsoft is hiring.

  3. Sometimes I imagine the biggest security flaw ever, one that will wreck almost every computer and grind the world to a halt for a decade as companies had to bootstrap back up to the kinds of machines capable of making more computers since those were affected too. I imagine that this security flaw is being implemented around now, by some guy in an office making a small arbitrary decision in some new architecture that nobody thinks to question and eventually makes its way into the industry standard. Eventually leading to that security flaw being discovered decades from now.

  4. Another speck ex bug like I thought before clicking, in the same vein as Spectre and Meltdown. Yup. Why not just get rid of this feature altogether, OR at least have some way to gate it on/off so that programs that really need the extra performance – or conversely, that need extra security – could enable / disable (or have the OS enable/disable) it? How much performance does it really make for that we could not make up for in other ways?

  5. Most ARM processors are running on bare metal or with OSes that don't use virtual memory. So.how.does this break all ARM processors?

    Second, Spectre didn't break the internet. It was a theoretical exploit.

  6. Oh man, this is an amazing bug. I was there in the 90's when "smashing the stack" hit. It was above my pay-grade at the time, but it was clear in the late 90's that you could get wrecked by a few bad bytes on the wire. Overflow after overflow into the new century, race conditions all over kernels, you sure you want a multi-user system? Nowadays, multi-tenant systems suffer similar problems with any shared resources. You really can't have everything in once package.

  7. Major security vulnerability found in CPU's.
    It's just speculative execution again.

    At least it's ARM so my games won't run worse when there's a software patch.

  8. I know it's not the main topic of the video, but at long as he mentioned it… To this day I cannot understand why there was so much trouble with buffer overflows. When I wrote programs in assembly language and needed to make a buffer, I allocated a certain number of bytes for it and the program kept track of how full it was. I could not (and still cannot) imagine why someone would not do that.

  9. EVERY ARM cpu? Really?! Well Microcontroller based on arm Cortex-M (armv-6m/-7m) does definetely not employ speculative execution per definition. So these cores are not affected by this issue. And even all Cortex-A8 (and -R8) are not affected either because the lack of speculative execution!

    But Basically ALL CPUs which use speculative execution are effected by this. This includes modern x64, PowerPC, MIPS, and even RISC-V with Speculative Execution

  10. ARM' — MOHYK' for: "You moved!" You know nothin, about any, simulated device net!
    I.e. claimed — our product! B'- two of + ff– Flyin Dutchman + er= double minded!
    You mixed — communicate! Felony

  11. /flach balz < in mol lsr < rol wn auch || O dub orb int/

    /int=bochal cjx(filrch zolmn)+ djs mrk < 2''px UI' abv/

    /ech rol at < mol balz lsr < cjx lk buoy pop xolmn arr/

    /ech lsr < int=arr bochal rol wn < mrkd dub orb int < mtxub through orb balz/

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button