Chrome, Linux systems hit by ARM ‘TIKTAG’ cyberattack

June 18, 2024
1 min read




Article Summary

TLDR:

  • ARM’s Memory Tagging Extension (MTE) aims to mitigate memory corruption attacks
  • Researchers found speculative execution attacks can leak MTE tags via TIKTAG gadgets

Security researchers have discovered a new ARM ‘TIKTAG’ attack that impacts Google Chrome and Linux systems. This attack targets systems with Memory Tagging Extension (MTE) and uses random tags for memory allocations and tag checks on every memory access. The researchers identified speculative execution attacks that can leak MTE tags through TIKTAG gadgets exploiting branch prediction, prefetchers, and store-to-load forwarding. Real-world attacks were developed against Chrome and Linux kernel, showing over 95% success in less than 4 seconds. The findings highlight the need to consider speculative execution vulnerabilities in designing MTE mitigations. This information has been reported to ARM, Google, and Android for further action.

Key Points:

  • Attack targets systems with Memory Tagging Extension (MTE)
  • Real-world attacks show over 95% success rate in less than 4 seconds

Security analysts have proposed various mitigations to address these attacks, such as hardware changes to separate microarchitectural behaviors from tag checks, speculation barriers, and avoiding gadget patterns. As MTE adoption grows, understanding these issues is crucial for secure deployment. The TIKTAG attack underscores the importance of considering speculative execution in creating hardware-enforced security mechanisms.


Latest from Blog

EU push for unified incident report rules

TLDR: The Federation of European Risk Management Associations (FERMA) is urging the EU to harmonize cyber incident reporting requirements ahead of new legislation. Upcoming legislation such as the NIS2 Directive, DORA, and