Promising Arm Security Feature Isn’t As Bulletproof As It Looks

Promising Arm Security Feature Isn’t As Bulletproof As It Looks

ARM’s Memory Tagging Extension, designed to stop memory corruption, can be bypassed via speculative execution. New TIKTAG gadgets leak memory tags with over 95% success, undermining MTE’s security guarantees in real systems like Google Chrome and the Linux kernel.

Source: HackerNoon