Connect with us

Published

on

THIS MEMORY-DEPENDENT PREFETCHER HAS TEETH — Unpatchable vulnerability in Apple chip leaks secret encryption keys Fixing newly discovered side channel will likely take a major toll on performance.

Dan Goodin – Mar 21, 2024 2:40 pm UTC EnlargeAurich Lawson | Apple reader comments 162

A newly discovered vulnerability baked into Apples M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.

The flawa side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocolscant be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster. Beware of hardware optimizations

The threat resides in the chips data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before its actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.

Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information. In response, cryptographic engineers have devised constant-time programming, an approach that ensures that all operations take the same amount of time to complete, regardless of their operands. It does this by keeping code free of secret-dependent memory accesses or structures.

The breakthrough of the new research is that it exposes a previously overlooked behavior of DMPs in Apple silicon: Sometimes they confuse memory content, such as key material, with the pointer value that is used to load other data. As a result, the DMP often reads the data and attempts to treat it as an address to perform memory access. This dereferencing of pointersmeaning the reading of data and leaking it through a side channelis a flagrant violation of the constant-time paradigm. Advertisement

The team of researchers consists of: Boru Chen, University of Illinois Urbana-Champaign Yingchen Wang, University of Texas at Austin Pradyumna Shome, Georgia Institute of Technology Christopher W. Fletcher, University of California, Berkeley David Kohlbrenner, University of Washington Riccardo Paccagnella, Carnegie Mellon University Daniel Genkin, Georgia Institute of Technology

In an email, they explained: Prefetchers usually look at addresses of accessed data (ignoring values of accessed data) and try to guess future addresses that might be useful. The DMP is different in this sense as in addition to addresses it also uses the data values in order to make predictions (predict addresses to go to and prefetch). In particular, if a data value looks like a pointer, it will be treated as an address (where in fact it’s actually not!) and the data from this address will be brought to the cache. The arrival of this address into the cache is visible, leaking over cache side channels.

Our attack exploits this fact. We cannot leak encryption keys directly, but what we can do is manipulate intermediate data inside the encryption algorithm to look like a pointer via a chosen input attack. The DMP then sees that the data value looks like an address, and brings the data from this address into the cache, which leaks the address. We dont care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.

In Thursdays paper, the team explained it slightly differently:

Our key insight is that while the DMP only dereferences pointers, an attacker can craft program inputs so that when those inputs mix with cryptographic secrets, the resulting intermediate state can be engineered to look like a pointer if and only if the secret satisfies an attacker-chosen predicate. For example, imagine that a program has secret s, takes x as input, and computes and then stores y = s ? x to its program memory. The attacker can craft different x and infer partial (or even complete) information about s by observing whether the DMP is able to dereference y. We first use this observation to break the guarantees of a standard constant-time swap primitive recommended for use in cryptographic implementations. We then show how to break complete cryptographic implementations designed to be secure against chosen-input attacks. Page: 1 2 3 Next → reader comments 162 Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Promoted Comments AusPeter Requires running a malicious application locally.

Reminder to avoid running applications youve downloaded from anywhere but trusted sources.And when the hackers attack your trusted sources?

Which reminded me of Reflections on Trusting Trust by Ken Thompson. March 21, 2024 at 3:28 pm Rene Gollent An exploit like this needs local access. If the bad baby eating hackers crawling on every corner of the internets already have local access you’re screwed anyway.I’d be careful making assumptions like this ; the same was true of exploits like Spectre until people managed to get it efficiently running in Javascript in a browser (which did not take very long after the spectre paper was released). Don’t assume that because the initial PoC is time consuming and requires a bunch of access that it won’t be refined into something much less demanding in short order. March 21, 2024 at 3:38 pm purecarot Its a very difficult exploit thats unlikely to affect you.It will affect him if Apple deploys a fix that affects CPU performance. March 21, 2024 at 4:47 pm Channel Ars Technica ← Previous story Next story → Related Stories Today on Ars

Continue Reading

Sports

Trout undergoes knee surgery, to start rehab

Published

on

By

Trout undergoes knee surgery, to start rehab

CLEVELAND — Los Angeles Angels star Mike Trout had surgery to repair a torn meniscus in his left knee on Friday, and the three-time AL MVP is expected to return this season.

Trout had a partial medial meniscectomy procedure performed in California. The team said the outfielder will remain in Anaheim for the start of his rehab process.

This is the fourth consecutive year that the 11-time All-Star has dealt with a significant injury.

“When they went in, it was exactly what we said it was and nothing else,” Angels manager Ron Washington reported before his team opened a three-game series in Cleveland. “So we’re all good.”

Washington said he spoke to Trout following the surgery.

Trout, 32, isn’t exactly sure when he injured his knee. He was leading the majors with 10 homers and had 14 RBIs and six steals before he was sidelined.

“He was in a good place, a really good place before he got hurt,” Washington said. “He went through a little bit of struggle, but I would rather have it now because once he finds it, he can go for three months.

“But mentally he was in a good place and for that to happen, I can understand how it took him down.”

When it was announced he would miss more time, Trout expressed frustration at being out for an extended period again.

Washington said his message to Trout was all positive.

“I let him know how much we miss him,” he said. “I’m happy the surgery went well, and I’m looking forward to his rehab and getting after it and getting back as fast as he possibly can. In the meantime, I told him, ‘Enjoy your rehab.'”

Trout missed most of the 2021 season with a strained calf, and several weeks in 2022 with a back injury. Last season, a broken hand sidelined him from July on.

Continue Reading

Sports

Yankees ace Cole to throw off mound Saturday

Published

on

By

Yankees ace Cole to throw off mound Saturday

NEW YORK — Yankees ace Gerrit Cole is scheduled to throw off a mound Saturday for the first time since getting injured in spring training.

“Whether that’s a full bullpen or what exactly that looks like, we’ll see,” New York manager Aaron Boone said before Friday night’s game against Detroit. “I think it’s gone well so far, his build-up and checking the boxes and the level of intensity of throwing and things like that. So far, so good. Getting off the mound will obviously be another step.”

The reigning AL Cy Young Award winner has been on the 60-day injured list all season with right elbow inflammation. He’s not expected back until at least June.

Cole, 33, has been throwing on flat ground. The right-hander was shut down in March because of nerve irritation and edema in his pitching elbow.

In other injury news, infielder Jon Berti played third base Thursday in a rehab game with Double-A Somerset and went 1 for 4 with a walk and two strikeouts. He was set to go through a workout Friday and potentially come off the injured list Saturday.

The speedy Berti has been sidelined since April 11 with a left groin strain.

“Looking forward to getting him back in the mix,” Boone said.

Right-handed reliever Nick Burdi (right hip inflammation) is slated to pitch Sunday for Somerset and could be reinstated from the IL after one or two minor league rehab outings.

Yankees reliever Tommy Kahnle (right shoulder inflammation) is expected to begin a rehab assignment after throwing live batting practice once or twice more. His next such session will be Saturday.

Cole went 15-4 with an AL-best 2.63 ERA and 222 strikeouts in 209 innings over 33 starts last year. The six-time All-Star is in the fifth season of a $324 million, nine-year contract that pays $36 million annually. Cole has the right to opt out after the season and become a free agent, but if he opts out, the Yankees can void the opt-out by adding a guaranteed $36 million salary for 2029.

Continue Reading

Sports

Twins place Buxton on IL with knee inflammation

Published

on

By

Twins place Buxton on IL with knee inflammation

MINNEAPOLIS — The Minnesota Twins placed center fielder Byron Buxton on the 10-day injured list Friday because of inflammation in his troublesome right knee, with guarded optimism his absence can be kept to the minimum.

Buxton exited early from the game at Chicago on Wednesday after experiencing soreness in the knee that he’s had two surgeries on and limited him to a designated hitter role last season. The discomfort caused him to pull up short while trying to steal second base for a third consecutive time, after the first two attempts were thwarted by foul balls.

The move was made retroactive to Thursday. Both president of baseball operations Derek Falvey and manager Rocco Baldelli said Friday they believe Buxton is on a realistic track to be ready to return when he’s eligible May 12, or at least a few days after that. An MRI test on his knee revealed no structural damage, Falvey said.

Meanwhile, third baseman Royce Lewis has been “tracking in a pretty good direction,” Falvey said. Lewis tore his right quadriceps while running the bases during his second at-bat in the season opener, and he has resumed swinging, jogging and some light work on the field.

Buxton is batting .250 with eight doubles, one triple, one home run, 12 runs and 11 RBIs in 28 games this season. The Twins recalled multi-position player Austin Martin from Triple-A St. Paul to take his roster spot. Willi Castro was in center field Friday in the series opener against Boston.

Continue Reading

Trending