By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits
Tech News

New SLAP & FLOP Attacks Expose Apple M-Series Chips to Speculative Execution Exploits

By Viral Trending Content 6 Min Read
Share
SHARE
SLAP & FLOP Attacks

A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel attacks targeting Apple silicon that could be exploited to leak sensitive information from web browsers like Safari and Google Chrome.

The attacks have been codenamed Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP) and Breaking the Apple M3 CPU via False Load Output Predictions (FLOP). Apple was notified of the issues in May and September 2024, respectively.

The vulnerabilities, like the previously disclosed iLeakage attack, build on Spectre, arising when speculative execution “backfires,” leaving traces of mispredictions in the CPU’s microarchitectural state and the cache.

Cybersecurity

Speculative execution refers to a performance optimization mechanism in modern processors that are aimed at predicting the control flow the CPU should take and execute instructions along the branch beforehand.

In the event of a misprediction, the results of the transient instructions are discarded and revert all changes made to the state following the prediction.

These attacks leverage the fact that speculative execution leaves traces to force a CPU to make a misprediction and execute a series of transient instructions, whose value could then be inferred through a side-channel even after the CPU rolls back all the changes to the state due to the misprediction.

“In SLAP and FLOP, we demonstrate that recent Apple CPUs go beyond this, not only predicting the control flow the CPU should take, but also the data flow the CPU should operate on if data are not readily available from the memory subsystem,” the researchers said.

“Unlike Spectre, mispredictions on data flow do not directly result in the CPU speculatively executing the wrong instructions. Instead, they result in the CPU executing arbitrary instructions on the wrong data. However, we show this can be combined with indirection techniques to execute wrong instructions.”

SLAP, which affects M2, A15, and newer chips, targets what’s called a Load Address Predictor (LAP) that Apple chips use to guess the next memory address the CPU will retrieve data from based on prior memory access patterns.

However, if the LAP predicts a wrong memory address, it can cause the processor to perform arbitrary computations on out-of-bounds data under speculative execution, thereby opening the door to an attack scenario where an adversary can recover email content from a logged-in user and browsing behavior from the Safari browser.

On the other hand, FLOP impacts M3, M4, and A17 chips, and takes aim at another feature called Load Value Predictor (LVP) that’s designed to improve data dependency performance by “guessing the data value that will be returned by the memory subsystem on the next access by the CPU core.”

FLOP causes “critical checks in program logic for memory safety to be bypassed, opening attack surfaces for leaking secrets stored in memory,” the researchers noted, adding it could be weaponized against both Safari and Chrome browsers to pull off various arbitrary memory read primitives, such as recovering location history, calendar events, and credit card information.

The disclosure comes nearly two months after researchers from Korea University detailed SysBumps, which they described as the first kernel address space layout randomization (KASLR) break attack on macOS for Apple silicon.

Cybersecurity

“By using Spectre-type gadgets in system calls, an unprivileged attacker can cause translations of the attacker’s chosen kernel addresses, causing the TLB to change according to the validity of the address,” Hyerean Jang, Taehun Kim, and Youngjoo Shin said. “This allows the construction of an attack primitive that breaks KASLR bypassing kernel isolation.”

Separately, new academic research has also uncovered an approach to “combine multiple side-channels to overcome limitations when attacking the kernel,” finding that address space tagging, “the very same feature that makes mitigation of side-channels efficient, opens up a new attack surface.”

This includes a practical attack dubbed TagBleed, which abuses tagged translation lookaside buffers (TLBs), which makes separating kernel and user address spaces efficient, and residual translation information to break KASLR even in the face of state-of-the-art mitigations” on modern architectures.

“This leakage is enough to fully derandomize KASLR when used in combination with a secondary side-channel attack that uses the kernel as a confused deputy to leak additional information about its address space,” VUSec researcher Jakob Koschel said.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

You Might Also Like

Samsung Galaxy A36 Black Friday Deal Saves You £150

This Lightweight Laptop Is Almost Half Off

New SonicWall SonicOS flaw allows hackers to crash firewalls

lynx, beavers, and aurochs benefit landscapes

Dell Pro Max 18 Plus: Desktop Power in a Portable Laptop

TAGGED: Apple, browser security, Cyber Security, Cybersecurity, data privacy, hardware security, Internet, side-channel attack, speculative execution, Threat Intelligence, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Trump’s Lawyers Ask New York Court to Overturn Business Records Conviction
Next Article Hong Kong SFC Continues Crypto Oversight, Reveals Dozens of New Fake Platforms
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Montenegro PM vows visa restrictions on Russian travellers
World News
Starbucks union says 30 more US stores are joining week-old strike
Business
Kevin Spacey Then & Now: Pictures of the Actor Over the Years
Celebrity
Kirby Air Riders Just Dropped, And It Might Be 2025’s Sleeper Giant
Gaming News
Nillion (NIL) price crashes 50% after unauthorized market-maker sell-off
Crypto
Bitcoin Long-Term Holders Keep Offloading Bags As Market Weakness Persists
Crypto
Nvidia relief won't be enough to dispel tech-bubble angst
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Montenegro PM vows visa restrictions on Russian travellers

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Montenegro PM vows visa restrictions on Russian travellers
November 20, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?