TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution

AI-generated keywords: ARM Memory Tagging Extension (MTE)

AI-generated Key Points

  • ARM Memory Tagging Extension (MTE) introduced in ARMv8.5-A architecture to detect memory corruption vulnerabilities
  • Recent research uncovers security risks from speculative execution attacks against MTE
  • TikTag gadgets identified for leaking MTE tags through speculative execution, increasing success rate of memory corruption attacks
  • Proposed defense mechanisms to mitigate impact of TikTag gadgets on system security
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, Byoungyoung Lee

License: CC BY 4.0

Abstract: ARM Memory Tagging Extension (MTE) is a new hardware feature introduced in ARMv8.5-A architecture, aiming to detect memory corruption vulnerabilities. The low overhead of MTE makes it an attractive solution to mitigate memory corruption attacks in modern software systems and is considered the most promising path forward for improving C/C++ software security. This paper explores the potential security risks posed by speculative execution attacks against MTE. Specifically, this paper identifies new TikTag gadgets capable of leaking the MTE tags from arbitrary memory addresses through speculative execution. With TikTag gadgets, attackers can bypass the probabilistic defense of MTE, increasing the attack success rate by close to 100%. We demonstrate that TikTag gadgets can be used to bypass MTE-based mitigations in real-world systems, Google Chrome and the Linux kernel. Experimental results show that TikTag gadgets can successfully leak an MTE tag with a success rate higher than 95% in less than 4 seconds. We further propose new defense mechanisms to mitigate the security risks posed by TikTag gadgets.

Submitted to arXiv on 13 Jun. 2024

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2406.08719v1

, , , , The ARM Memory Tagging Extension (MTE) is a hardware feature introduced in the ARMv8.5-A architecture to detect memory corruption vulnerabilities. MTE offers low overhead and is an attractive solution for improving C/C++ software security. However, recent research has uncovered potential security risks posed by speculative execution attacks against MTE. In their study titled "TikTag: Breaking ARM’s Memory Tagging Extension with Speculative Execution," researchers Juhee Kim, Jinbum Park, Sihyeon Roh, Jaeyoung Chung, Youngjoo Lee, Taesoo Kim, and Byoungyoung Lee delve into the vulnerabilities of MTE. They identify new TikTag gadgets capable of leaking MTE tags from arbitrary memory addresses through speculative execution. These TikTag gadgets enable attackers to bypass the probabilistic defense mechanisms of MTE, significantly increasing the success rate of memory corruption attacks. The researchers demonstrate that TikTag gadgets can be used to bypass MTE-based mitigations in real-world systems such as Google Chrome and the Linux kernel. Experimental results show that TikTag gadgets can successfully leak an MTE tag with a success rate exceeding 95% in less than 4 seconds. To address these security risks, the researchers propose new defense mechanisms aimed at mitigating the impact of TikTag gadgets on system security. Comparing their work to previous research efforts like StickyTags, which proposed deterministic tagging as a defense mechanism against tag leakage, this study focuses on enhancing random tagging-based MTE defenses. By analyzing and addressing the root causes of both TIKTAG-v1 and TIKTAG-v2 gadgets, the researchers aim to strengthen existing hardware and software defenses against speculative execution attacks targeting MTE. Overall, this study sheds light on the critical importance of understanding and mitigating security risks associated with emerging hardware features like MTE in order to enhance overall system security and protect against memory corruption vulnerabilities effectively.
Created on 30 Jun. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.