Chrome, Linux systems hit by ARM ‘TIKTAG’ cyberattack

June 18, 2024
1 min read




Article Summary

TLDR:

  • ARM’s Memory Tagging Extension (MTE) aims to mitigate memory corruption attacks
  • Researchers found speculative execution attacks can leak MTE tags via TIKTAG gadgets

Security researchers have discovered a new ARM ‘TIKTAG’ attack that impacts Google Chrome and Linux systems. This attack targets systems with Memory Tagging Extension (MTE) and uses random tags for memory allocations and tag checks on every memory access. The researchers identified speculative execution attacks that can leak MTE tags through TIKTAG gadgets exploiting branch prediction, prefetchers, and store-to-load forwarding. Real-world attacks were developed against Chrome and Linux kernel, showing over 95% success in less than 4 seconds. The findings highlight the need to consider speculative execution vulnerabilities in designing MTE mitigations. This information has been reported to ARM, Google, and Android for further action.

Key Points:

  • Attack targets systems with Memory Tagging Extension (MTE)
  • Real-world attacks show over 95% success rate in less than 4 seconds

Security analysts have proposed various mitigations to address these attacks, such as hardware changes to separate microarchitectural behaviors from tag checks, speculation barriers, and avoiding gadget patterns. As MTE adoption grows, understanding these issues is crucial for secure deployment. The TIKTAG attack underscores the importance of considering speculative execution in creating hardware-enforced security mechanisms.


Latest from Blog

Top 20 Linux Admin Tools for 2024

TLDR: Top Linux Admin Tools in 2024 Key points: Linux admin tools streamline system configurations, performance monitoring, and security management. Popular Linux admin tools include Webmin, Puppet, Zabbix, Nagios, and Ansible. Summary

Bogus job tempts aerospace, energy workers

TLDR: A North Korean cyberespionage group is posing as job recruiters to target employees in aerospace and energy sectors. Mandiant reports that the group uses fake job descriptions stored in malicious archives