Connect with us

Published

on

THIS MEMORY-DEPENDENT PREFETCHER HAS TEETH — Unpatchable vulnerability in Apple chip leaks secret encryption keys Fixing newly discovered side channel will likely take a major toll on performance.

Dan Goodin – Mar 21, 2024 2:40 pm UTC EnlargeAurich Lawson | Apple reader comments 162

A newly discovered vulnerability baked into Apples M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.

The flawa side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocolscant be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster. Beware of hardware optimizations

The threat resides in the chips data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before its actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.

Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information. In response, cryptographic engineers have devised constant-time programming, an approach that ensures that all operations take the same amount of time to complete, regardless of their operands. It does this by keeping code free of secret-dependent memory accesses or structures.

The breakthrough of the new research is that it exposes a previously overlooked behavior of DMPs in Apple silicon: Sometimes they confuse memory content, such as key material, with the pointer value that is used to load other data. As a result, the DMP often reads the data and attempts to treat it as an address to perform memory access. This dereferencing of pointersmeaning the reading of data and leaking it through a side channelis a flagrant violation of the constant-time paradigm. Advertisement

The team of researchers consists of: Boru Chen, University of Illinois Urbana-Champaign Yingchen Wang, University of Texas at Austin Pradyumna Shome, Georgia Institute of Technology Christopher W. Fletcher, University of California, Berkeley David Kohlbrenner, University of Washington Riccardo Paccagnella, Carnegie Mellon University Daniel Genkin, Georgia Institute of Technology

In an email, they explained: Prefetchers usually look at addresses of accessed data (ignoring values of accessed data) and try to guess future addresses that might be useful. The DMP is different in this sense as in addition to addresses it also uses the data values in order to make predictions (predict addresses to go to and prefetch). In particular, if a data value looks like a pointer, it will be treated as an address (where in fact it’s actually not!) and the data from this address will be brought to the cache. The arrival of this address into the cache is visible, leaking over cache side channels.

Our attack exploits this fact. We cannot leak encryption keys directly, but what we can do is manipulate intermediate data inside the encryption algorithm to look like a pointer via a chosen input attack. The DMP then sees that the data value looks like an address, and brings the data from this address into the cache, which leaks the address. We dont care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.

In Thursdays paper, the team explained it slightly differently:

Our key insight is that while the DMP only dereferences pointers, an attacker can craft program inputs so that when those inputs mix with cryptographic secrets, the resulting intermediate state can be engineered to look like a pointer if and only if the secret satisfies an attacker-chosen predicate. For example, imagine that a program has secret s, takes x as input, and computes and then stores y = s ? x to its program memory. The attacker can craft different x and infer partial (or even complete) information about s by observing whether the DMP is able to dereference y. We first use this observation to break the guarantees of a standard constant-time swap primitive recommended for use in cryptographic implementations. We then show how to break complete cryptographic implementations designed to be secure against chosen-input attacks. Page: 1 2 3 Next → reader comments 162 Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Promoted Comments AusPeter Requires running a malicious application locally.

Reminder to avoid running applications youve downloaded from anywhere but trusted sources.And when the hackers attack your trusted sources?

Which reminded me of Reflections on Trusting Trust by Ken Thompson. March 21, 2024 at 3:28 pm Rene Gollent An exploit like this needs local access. If the bad baby eating hackers crawling on every corner of the internets already have local access you’re screwed anyway.I’d be careful making assumptions like this ; the same was true of exploits like Spectre until people managed to get it efficiently running in Javascript in a browser (which did not take very long after the spectre paper was released). Don’t assume that because the initial PoC is time consuming and requires a bunch of access that it won’t be refined into something much less demanding in short order. March 21, 2024 at 3:38 pm purecarot Its a very difficult exploit thats unlikely to affect you.It will affect him if Apple deploys a fix that affects CPU performance. March 21, 2024 at 4:47 pm Channel Ars Technica ← Previous story Next story → Related Stories Today on Ars

Continue Reading

Sports

Braves activate RHP Anderson, sign OF Rosario

Published

on

By

Braves activate RHP Anderson, sign OF Rosario

It was old faces in familiar places for the Atlanta Braves on Monday after they activated right-hander Ian Anderson to the active roster and signed outfielder Eddie Rosario to a major league contract.

In corresponding moves, outfielder Jarred Kelenic was optioned to Triple-A Gwinnett, while right-hander Davis Daniel was optioned to Triple-A after Sunday’s game.

Both Anderson and Rosario emerged as 2021 postseason heroes in Atlanta as the Braves went on to win the World Series.

Anderson, who was claimed off waivers from the Los Angeles Angels on Sunday, went 4-0 with a 1.26 ERA in eight postseason starts for the Braves over the 2020 and 2021 postseasons.

In the 2021 World Series, Anderson famously pitched five no-hit innings in Game 3 to lead Atlanta to a 2-0 victory over the Houston Astros. The Braves defeated the Astros in six games.

Anderson, who turns 27 Friday, was traded by the Braves to the Angels on March 23 for left-hander Jose Suarez. He struggled badly with his new club, going 0-1 with an 11.57 ERA in seven relief appearances. He allowed 17 hits and seven walks in just 9⅓ innings.

Rosario, 33, signed with the Los Angeles Dodgers in February and played in two games with the club, going 1-for-4. He was designated for assignment and became a free agent when Shohei Ohtani returned from the paternity list just over a week ago.

Rosario was the 2021 National League Championship Series MVP, when he powered the Braves past the Dodgers with three home runs, nine RBIs and a 1.647 OPS in six games.

Over parts of 11 seasons, Rosario is a career .261 hitter with 169 home runs and 583 RBIs in 1,123 games with five different clubs, including five seasons with the Minnesota Twins (2015-20) and four with the Braves (2021-24).

Kelenic, 25, was batting .167 with two home runs in 23 games and is a career .211 hitter with 49 home runs and 156 RBIs in 406 games with the Seattle Mariners (2021-23) and Braves.

Daniel, 27, made his only appearance for the Braves on Sunday with a scoreless inning and has appeared in 10 games (six starts) over the past three seasons with a 4.95 ERA.

Continue Reading

Technology

Spotify paid over $100 million to podcasts in the first quarter, including Joe Rogan, Alex Cooper and Theo Von

Published

on

By

Spotify paid over 0 million to podcasts in the first quarter, including Joe Rogan, Alex Cooper and Theo Von

Pavlo Gonchar | Lightrocket | Getty Images

Spotify said Monday it paid more than $100 million to podcast publishers and podcasters worldwide in the first quarter of 2025.

The figure includes all creators on the platform across all formats and agreements, including the platform’s biggest fish, Joe Rogan, Alex Cooper and Theo Von, the company said.

Rogan, host of “The Joe Rogan Experience,” Cooper of “Call Her Daddy” and “This Past Weekend w/ Theo Von” were among the top podcasts on Spotify globally in 2024.

Rogan and Cooper’s exclusivity deals with Spotify have ended, and while Rogan signed a new Spotify deal last year worth up to $250 million, including revenue sharing and the ability to post on YouTube, Cooper inked a SiriusXM deal in August.

Read more CNBC tech news

Even when shows are no longer exclusive to Spotify, they are still uploaded to the platform and qualify for the Spotify Partner Program, which launched in January in the U.S., U.K., Canada and Australia.

The program allows creators to earn revenue every time an ad monetized by Spotify plays in the episode, as well as revenue when Premium subscribers watch dynamic ads on videos.

Competing platform Patreon said it paid out over $472 million to podcasters from over 6.7 million paid memberships in 2024.

YouTube’s payouts are massive by comparison but include more than just podcasts. The company said it paid $70 billion to creators between 2021 and 2024 with payouts rising each year, according to YouTube CEO Neal Mohan.

Spotify reports first-quarter earnings on Tuesday.

Continue Reading

Environment

BYD now has the world’s largest car transport ship and it just set sail overseas

Published

on

By

BYD now has the world's largest car transport ship and it just set sail overseas

The BYD “Shenzhen” set sail on its first voyage overseas this week. With 9,200 parking spots, or about enough to fill 20 football fields, BYD’s new car transport ship is now the world’s largest.

BYD’s largest car carrier sets sail for Brazil

BYD’s Shenzhen is on its maiden voyage to Brazil after setting sail on April 27. The vessel is carrying over 7,000 new energy vehicles (NEVs), including electric vehicles (EVs) and plug-in hybrid electric vehicles (PHEVs). It’s the largest single batch of NEVs exported from China so far.

The new vessel is BYD’s fourth car transport ship and the world’s largest, capable of carrying 9,000 vehicles. According to the company, that’s enough to fill about 20 football fields.

BYD launched its first car carrier, the Explorer No 1, in January 2024. It has already completed several trips to Germany, Spain, and Brazil.

Advertisement – scroll for more content

Its second, the BYD Changzhou, set sail in December 2024, followed by the Hefei earlier this year. All three vessels can carry up to 7,000 vehicles, making the Shenzhen the largest so far.

BYD's-largest-car-transport-ship
BYD Shenzhen, the world’s largest car transport ship (Source: BYD)

The Shenzhen is named after the automaker’s hometown and demonstrates “BYD’s firm determination to promote sustainable development in Brazil.”

BYD is preparing to launch two more vessels, the Changsha and Xi’an. The Changsha is expected to launch soon, while the Xi’an was introduced on April 2.

The new car carriers will help accelerate BYD’s aggressive overseas expansion. In the first three months of 2025, the company sold over 206,000 NEVs overseas, more than double the number it sold last year.

BYD sells a wide range of vehicles in Brazil, including the low-cost Dolphin Mini, starting at around $20,000 (99,800 BRL). In October, it launched its first hybrid pickup truck, the Shark, starting at 379,800 BTL ($66,900).

Brazil is only one overseas market that BYD is targeting. BYD’s sales are expected to double in Europe in 2025, with significant growth in other key regions like Southeast Asia, Japan, Mexico, and South Korea, to name a few.

Source: BYD

FTC: We use income earning auto affiliate links. More.

Continue Reading

Trending