Connect with us

Published

on

THIS MEMORY-DEPENDENT PREFETCHER HAS TEETH — Unpatchable vulnerability in Apple chip leaks secret encryption keys Fixing newly discovered side channel will likely take a major toll on performance.

Dan Goodin – Mar 21, 2024 2:40 pm UTC EnlargeAurich Lawson | Apple reader comments 162

A newly discovered vulnerability baked into Apples M-series of chips allows attackers to extract secret keys from Macs when they perform widely used cryptographic operations, academic researchers have revealed in a paper published Thursday.

The flawa side channel allowing end-to-end key extractions when Apple chips run implementations of widely used cryptographic protocolscant be patched directly because it stems from the microarchitectural design of the silicon itself. Instead, it can only be mitigated by building defenses into third-party cryptographic software that could drastically degrade M-series performance when executing cryptographic operations, particularly on the earlier M1 and M2 generations. The vulnerability can be exploited when the targeted cryptographic operation and the malicious application with normal user system privileges run on the same CPU cluster. Beware of hardware optimizations

The threat resides in the chips data memory-dependent prefetcher, a hardware optimization that predicts the memory addresses of data that running code is likely to access in the near future. By loading the contents into the CPU cache before its actually needed, the DMP, as the feature is abbreviated, reduces latency between the main memory and the CPU, a common bottleneck in modern computing. DMPs are a relatively new phenomenon found only in M-series chips and Intel’s 13th-generation Raptor Lake microarchitecture, although older forms of prefetchers have been common for years.

Security experts have long known that classical prefetchers open a side channel that malicious processes can probe to obtain secret key material from cryptographic operations. This vulnerability is the result of the prefetchers making predictions based on previous access patterns, which can create changes in state that attackers can exploit to leak information. In response, cryptographic engineers have devised constant-time programming, an approach that ensures that all operations take the same amount of time to complete, regardless of their operands. It does this by keeping code free of secret-dependent memory accesses or structures.

The breakthrough of the new research is that it exposes a previously overlooked behavior of DMPs in Apple silicon: Sometimes they confuse memory content, such as key material, with the pointer value that is used to load other data. As a result, the DMP often reads the data and attempts to treat it as an address to perform memory access. This dereferencing of pointersmeaning the reading of data and leaking it through a side channelis a flagrant violation of the constant-time paradigm. Advertisement

The team of researchers consists of: Boru Chen, University of Illinois Urbana-Champaign Yingchen Wang, University of Texas at Austin Pradyumna Shome, Georgia Institute of Technology Christopher W. Fletcher, University of California, Berkeley David Kohlbrenner, University of Washington Riccardo Paccagnella, Carnegie Mellon University Daniel Genkin, Georgia Institute of Technology

In an email, they explained: Prefetchers usually look at addresses of accessed data (ignoring values of accessed data) and try to guess future addresses that might be useful. The DMP is different in this sense as in addition to addresses it also uses the data values in order to make predictions (predict addresses to go to and prefetch). In particular, if a data value looks like a pointer, it will be treated as an address (where in fact it’s actually not!) and the data from this address will be brought to the cache. The arrival of this address into the cache is visible, leaking over cache side channels.

Our attack exploits this fact. We cannot leak encryption keys directly, but what we can do is manipulate intermediate data inside the encryption algorithm to look like a pointer via a chosen input attack. The DMP then sees that the data value looks like an address, and brings the data from this address into the cache, which leaks the address. We dont care about the data value being prefetched, but the fact that the intermediate data looked like an address is visible via a cache channel and is sufficient to reveal the secret key over time.

In Thursdays paper, the team explained it slightly differently:

Our key insight is that while the DMP only dereferences pointers, an attacker can craft program inputs so that when those inputs mix with cryptographic secrets, the resulting intermediate state can be engineered to look like a pointer if and only if the secret satisfies an attacker-chosen predicate. For example, imagine that a program has secret s, takes x as input, and computes and then stores y = s ? x to its program memory. The attacker can craft different x and infer partial (or even complete) information about s by observing whether the DMP is able to dereference y. We first use this observation to break the guarantees of a standard constant-time swap primitive recommended for use in cryptographic implementations. We then show how to break complete cryptographic implementations designed to be secure against chosen-input attacks. Page: 1 2 3 Next → reader comments 162 Dan Goodin Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords. In his spare time, he enjoys gardening, cooking, and following the independent music scene. Advertisement Promoted Comments AusPeter Requires running a malicious application locally.

Reminder to avoid running applications youve downloaded from anywhere but trusted sources.And when the hackers attack your trusted sources?

Which reminded me of Reflections on Trusting Trust by Ken Thompson. March 21, 2024 at 3:28 pm Rene Gollent An exploit like this needs local access. If the bad baby eating hackers crawling on every corner of the internets already have local access you’re screwed anyway.I’d be careful making assumptions like this ; the same was true of exploits like Spectre until people managed to get it efficiently running in Javascript in a browser (which did not take very long after the spectre paper was released). Don’t assume that because the initial PoC is time consuming and requires a bunch of access that it won’t be refined into something much less demanding in short order. March 21, 2024 at 3:38 pm purecarot Its a very difficult exploit thats unlikely to affect you.It will affect him if Apple deploys a fix that affects CPU performance. March 21, 2024 at 4:47 pm Channel Ars Technica ← Previous story Next story → Related Stories Today on Ars

Continue Reading

Sports

Sources: Red Sox deal Devers to Giants in stunner

Published

on

By

Sources: Red Sox deal Devers to Giants in stunner

The San Francisco Giants are acquiring All-Star slugger Rafael Devers from the Boston Red Sox, sources confirmed to ESPN’s Jeff Passan on Sunday evening.

The Giants are sending starter Jordan Hicks and 23-year-old lefty Kyle Harrison, among others, to Boston in exchange, sources said.

Devers, 28, is in just the second season of a 10-year, $313.5 million contract he signed to stay in Boston in January 2023, however his relationship with the team suffered a significant blow after the star third baseman was reportedly blindsided by a move to designated hitter in the spring.

Tensions flared again last month after Devers refused an offer from the team to move him to first base after starting first baseman Triston Casas was ruled out for the season with a knee injury.

It reached a point where Red Sox owner John Henry met with the disgruntled star, making a rare trip to meet the team on the road and smooth things over after Devers’ pointed comments about the request to switch positions again.

Hicks and Harrison give a pitching-starved Red Sox team more depth on their staff while Devers provides a huge boost to a middling Giants offense.

Devers has more than 200 career home runs to his name and has a .894 OPS for Boston this season.

The deal was first reported by Fansided.

Continue Reading

Sports

Ohtani’s pitching return might be coming soon

Published

on

By

Ohtani's pitching return might be coming soon

Shohei Ohtani‘s pitching debut for the Los Angeles Dodgers might be quickly approaching.

Manager Dave Roberts told reporters Sunday that Ohtani would throw another simulated game in the coming days that could “potentially” be his last one, and a source told ESPN’s Buster Olney that Ohtani should join the Dodgers’ rotation “sooner rather than later,” potentially within the week.

Ohtani took a big step forward during his most recent simulated game at Petco Park on Tuesday, throwing 44 pitches over the course of three innings against a couple of lower-level minor league players. Ohtani’s fastball reached the mid- to upper-90s, and he exhibited good command of his off-speed pitches in what amounted to his third time facing hitters. Afterward, Roberts said there was a “north of zero” chance Ohtani could join the rotation before the All-Star break.

Because of his two-way designation, the Dodgers can carry Ohtani as an extra pitcher, which means he can throw two to three innings and have someone pitch after him as a piggyback starter. At this point, it seems that is the Dodgers’ plan.

The Dodgers’ pitching staff has again been plagued by injury, with 14 pitchers on the injured list, including four starting pitchers the team was heavily counting on for 2025 — Blake Snell, Tony Gonsolin, Roki Sasaki and Tyler Glasnow.

If Ohtani returns in July — the likely outcome at this point — he will be 22 months removed from a second repair of his ulnar collateral ligament.

The update isn’t as optimistic for Sasaki. He paused his throwing program and is set for a lengthy layoff. Sasaki has not pitched in a game since May 9 and is not part of the team’s long-term pitching plans this season.

“I think that’s what the mindset should be,” Roberts said. “Being thrust into this environment certainly was a big undertaking for him, and now you layer in the health part and the fact he’s a starting pitcher, knowing what the build-up [required to return] entails … I think that’s the prudent way to go about it.”

Sasaki, 23, went 1-1 with a 4.72 ERA in eight starts after joining the Dodgers from the Pacific League’s Chuba Lotte Marines, averaging less than 4⅓ innings per start. He walked 22 and struck out 24 in 34⅓ innings, and his fastball averaged 95.7 mph, down 3-4 mph from his average in Japan.

Roberts said Sasaki was pain free when he resumed throwing in early June, but the pitcher was shut down after feeling discomfort this past week. Sasaki recently received a cortisone injection in the shoulder; Roberts said no further scans are planned.

“I don’t think it’s pain,” Roberts said. “I don’t know if it’s discomfort, if it’s tightness, if he’s just not feeling strong, whatever the adjective you want to use. That’s more of a question for Roki, as far as the sensation he’s feeling.

“He’s just not feeling like he can ramp it up, and we’re not going to push him to do something he doesn’t feel good about right now.”

The Associated Press contributed to this report.

Continue Reading

Sports

Judge 1-for-12 as NY swept: Got to swing at strikes

Published

on

By

Judge 1-for-12 as NY swept: Got to swing at strikes

BOSTON — Aaron Judge blamed himself for swinging at pitches outside the strike zone as the New York Yankees were swept in a three-game series against the Boston Red Sox.

“You got to swing at strikes,” Judge said after going 1-for-12 in the series, which Boston completed with a 2-0 victory on Sunday.

Judge struck out three or more times in three straight games for only the third time in his major league career.

“That usually helps any hitter when you swing at strikes,” Judge added. “Definitely some pitches off the edge or off the edge in, you know, taking some hacks just trying to make something happen.”

Judge had a tying solo homer in the opener Friday night but struck out nine times as the Yankees were swept in a series for the first time this season.

New York scored only four runs in the three games, matching its fewest in a three-game series at Fenway Park, on June 20-22, 1916 and on Sept. 28-30, 1922.

“It’s very hard,” Red Sox manager Alex Cora said of facing Judge. “He’s so good at what he does. We used our fastballs in the right spots, we got some swing and misses.”

“Throughout the years we’ve been aggressive with him,” Cora added. “Sometimes he gets us, sometimes we do a good job with that. It’s always fun to compete against the best, and, to me, he’s the best in the business right now.”

Judge’s major league-leading average dipped to .378.

“I don’t think much of it,” teammate Ben Rice said. “If I could have that guy hitting every single at-bat even if he’s not at his best, I would do it. I’m sure he’ll bounce back. He’ll be all right.”

Judge faced Garrett Whitlock with two on in the eighth Sunday and bounced into an inning-ending double play.

“He’s one of the greatest hitters in the world,” Whitlock said. “It’s special to watch him play and everything. We tried to execute and had some execution this weekend.”

Continue Reading

Trending