Linux
researchers find an unfixable bug in EVERY ARM cpu
ARM is a great computer architecture with some great security features. In this video we talk about TikTag, a new attack that shows how one can use speculative execution to see the future.
π« COURSES π« Learn to code in C at
π GREAT BOOKS FOR THE LOWEST LEVELπ
Blue Fox: Arm Assembly Internals and Reverse Engineering:
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation :
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software :
The Ghidra Book: The Definitive Guide:
π₯ SOCIALS π₯
Come hang out at
[ad_2]
source
haha wow that https://lowlevel.academy guy seemed pretty cool huh?
I can't wait till hackers start using electron microscopes and EMF detectors to read memory
now you know why java doesnt come in newer versions in apple comptuers or ios by defalt and why javascript kernal level retrection safe gards are very heavly reforced too as well.
Can this escape virtualisation?
Can we please stop using the phrase: "broke the internet" nothing which was decribed with this phrase came even close to breaking the internet. People really dont know how uninteresting they are to the world
I wonder how RISC-V compares security-wise.
"SPECULATIVE EXECUTION!"
Why does your LLA stuff not have Rust?
Amazing find by these researchers! This is the beauty of our community: ppl take time and try new things and find these bugs like this!
Excellent explanation. However I would say it's not a bug, it's a data vulnerability.
Speculative execution is a little more than prefetching. Besides that if you want to keep learning and growing, the Linux System Group at Microsoft is hiring.
Spectre again?
Sometimes I imagine the biggest security flaw ever, one that will wreck almost every computer and grind the world to a halt for a decade as companies had to bootstrap back up to the kinds of machines capable of making more computers since those were affected too. I imagine that this security flaw is being implemented around now, by some guy in an office making a small arbitrary decision in some new architecture that nobody thinks to question and eventually makes its way into the industry standard. Eventually leading to that security flaw being discovered decades from now.
Another speck ex bug like I thought before clicking, in the same vein as Spectre and Meltdown. Yup. Why not just get rid of this feature altogether, OR at least have some way to gate it on/off so that programs that really need the extra performance – or conversely, that need extra security – could enable / disable (or have the OS enable/disable) it? How much performance does it really make for that we could not make up for in other ways?
I found a speculative buffer overflow that works on any abacus
it's not every ARM processor, only V9? so title is kinda clickbait
'Economy' cores will probably get rebranded 'security' cores after this. (I'm sorry, 'Efficiency' cores).
Let's reinvent mechanical computing
If x86 is unsafe and ARM is unsafe, let's all go back to Z80 and overclock them to the moon.
Hackers are hacking INTO THE FUTURE!!!
I don't think there are virtual addresses in RISC processors….
Daily reminder that ARM Astands for Acorn RISC Machine
Hardware not so hard π
Dude just invalidated my entire Computer Architecture class. I hate school.
Why do you sound like Allu Arjun hindi dub moviesππ
-6.5db plz make louder
"Unfixable" as long as the compiler / programmer uses that tagging feature…
Most ARM processors are running on bare metal or with OSes that don't use virtual memory. So.how.does this break all ARM processors?
Second, Spectre didn't break the internet. It was a theoretical exploit.
RISC-V?
V8? Java run time ? JIT ? π
Oh man, this is an amazing bug. I was there in the 90's when "smashing the stack" hit. It was above my pay-grade at the time, but it was clear in the late 90's that you could get wrecked by a few bad bytes on the wire. Overflow after overflow into the new century, race conditions all over kernels, you sure you want a multi-user system? Nowadays, multi-tenant systems suffer similar problems with any shared resources. You really can't have everything in once package.
Assembly code since the 70s here .. and yes, we're still longhaired and play music .. approaching 62 π
Major security vulnerability found in CPU's.
It's just speculative execution again.
At least it's ARM so my games won't run worse when there's a software patch.
I know it's not the main topic of the video, but at long as he mentioned it… To this day I cannot understand why there was so much trouble with buffer overflows. When I wrote programs in assembly language and needed to make a buffer, I allocated a certain number of bytes for it and the program kept track of how full it was. I could not (and still cannot) imagine why someone would not do that.
1:00 Wow. Korean research paper!
EVERY ARM cpu? Really?! Well Microcontroller based on arm Cortex-M (armv-6m/-7m) does definetely not employ speculative execution per definition. So these cores are not affected by this issue. And even all Cortex-A8 (and -R8) are not affected either because the lack of speculative execution!
But Basically ALL CPUs which use speculative execution are effected by this. This includes modern x64, PowerPC, MIPS, and even RISC-V with Speculative Execution
Where are those Intel haters now?
Similar Attack is proven long backβ¦
But nice oneβ¦
https://cap.csail.mit.edu/sites/default/files/research-pdfs/PACMAN-%20Attacking%20ARM%20Pointer%20Authentication%20with%20Speculative%20Execution.pdf
Love this guy. Incredibly smart, incredibly articulate. Really impressed. An inspiration to us all.
this kind of exploit is not accessible to a lambda hacker ? only governements agencies can use it ?
Memory pointer tags should have been formed by encryption of the pointer value and, therefore, immutable.
you look like the trump shooter imma be honest
Therefore blockchain is inherently unsafe and all the crypto coins…
Does this apply to the new X Elite laptops since they are ARM?
Huuuuuh
this mean that every mobile phone as they have ARM cpus are vulnerable?
ARM' — MOHYK' for: "You moved!" You know nothin, about any, simulated device net!
I.e. claimed — our product! B'- two of + ff– Flyin Dutchman + er= double minded!
You mixed — communicate! Felony
/flach balz < in mol lsr < rol wn auch || O dub orb int/
/int=bochal cjx(filrch zolmn)+ djs mrk < 2''px UI' abv/
/ech rol at < mol balz lsr < cjx lk buoy pop xolmn arr/
/ech lsr < int=arr bochal rol wn < mrkd dub orb int < mtxub through orb balz/