Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Bypassing ARM's Memory Tagging Extension with Side-Channel Attacks

Black Hat via YouTube

Overview

Coursera Plus Monthly Sale: All Certificates & Courses 40% Off!
Explore a 27-minute Black Hat conference talk that reveals critical vulnerabilities in ARM's Memory Tagging Extension (MTE), a hardware security feature in ARMv8.5-A architecture. Discover how researchers from Seoul National University, Samsung Research, and Georgia Institute of Technology demonstrate new exploitation techniques that compromise MTE's memory corruption protection through speculative execution side-channel attacks. Learn about the implications of these findings for high-profile implementations like Google Chrome and the Linux kernel, where MTE-based protections can be bypassed. Understand why this promising security advancement, first deployed in Pixel 8 devices in October 2023, requires further improvements to effectively protect against sophisticated memory corruption attacks. Gain insights into the current limitations of MTE and its impact on C/C++ software security, as presented by an international team of security researchers and academics.

Syllabus

Bypassing ARM's Memory Tagging Extension with a Side-Channel Attack

Taught by

Black Hat

Reviews

Start your review of Bypassing ARM's Memory Tagging Extension with Side-Channel Attacks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.