- Joined
- Sep 26, 2021
- Posts
- 6,859
- Main Camera
- Sony

Unpatchable vulnerability in Apple chip leaks secret encryption keys
Fixing newly discovered side channel will likely take a major toll on performance.

Memory prefetching is the problem.
It will be interesting if someone can get a browser and Javascript to run the attack but otherwise, it doesn't seem very troubling. I think I would notice if something was running in the background and taking over one of my clusters for a minimum of 26 minutes.![]()
Unpatchable vulnerability in Apple chip leaks secret encryption keys
Fixing newly discovered side channel will likely take a major toll on performance.arstechnica.com
Memory prefetching is the problem.
It’s important because we don’t know if there are simpler attacks. I just don’t think this version is going to be a risk for Mac users but the research is important.This has the feel of yet another academic security research paper where yes, they found a side channel attack, but it probably isn't practical to exploit in the real world. There have been a lot of papers like that which resulted in no mitigations.
They only mention that the fetching behaviour affected can be disabled on M3 by a special bit, but it sill suggests that M3 is fundamentally affected also just possibly to a lesser extent and to a lesser performance penalty.
@Cmaier : Appreciating that you are not working at Apple , but really just interested in getting your experienced take on this one...
At this stage in M4's development schedule (assuming readiness for a November release time frame) or even iPhone A18 in September / October time frame, would it be too late in the day to make small micro architectural security tweaks to the next apple silicon generation chips (assuming a fix is relatively small)?
I’m 100% sure it wasn’t intentional. The entire time I was designing CPUs, it never occurred to us to even look for side-channel attack vectors. I never even heard of side-channel attacks until my last year at AMD, and that was only because I sat in on a hearing involving patents on preventing side channel attacks. Unless you were designing an embedded crypto processor, you just weren’t even considering the issue, let alone making your CPU less efficient in order to avoid the problem. Unless you did so by accident, like if you were designing in full-differential logic (and that wouldn’t have stopped Spectre-style attacks).I'm going to put my tinfoil hat here for a second but when I learnt of Spectre on x86 (how long it had been present) and possibly to a lesser extent this GoFetch vulnerability on Apple Silicon I honest wondered if this was an intentional backdoor for security agencies...
Now before anybody says that I'm off my rocker, let me just point out that there is a history of this with the CIA/NSA in US and MI5/MI6 UK.
![]()
CIA Secretly Owned Global Encryption Provider, Built Backdoors, Spied On 100+ Foreign Governments: Report
Global encryption provider used for decades by hundreds of governments was owned by the CIA, according to a new investigation.www.forbes.com
![]()
A Brief History of the U.S. Trying to Add Backdoors Into Encrypted Data
It’s been a weird week for America’s most valuable company—a firm whose tech products have such consumer goodwill they got away with forcing us to listen to...www.atlasobscura.com
To be honest, at least with spectre I wouldn't be at all surprised given that Windows is the dominant desktop operating system.
I'm going to put my tinfoil hat here for a second but when I learnt of Spectre on x86 (how long it had been present) and possibly to a lesser extent this GoFetch vulnerability on Apple Silicon I honest wondered if this was an intentional backdoor for security agencies...
As I understand it, this part's a classic cache timing side channel attack. Set up an array of memory locations, get it all in cache making sure to completely fill L1 with your array, ask the victim to do something for you, test array locations to see which ones are slower to read and therefore got evicted. From this, you can retrieve at least some bits of the addresses of memory references (or, in this case, prefetches) done by the victim process.If I understood the paper correctly the basic idea is:
- There are ways to tell if the target address has been prefetched, even from a different process that doesn't have access to that memory
Yes, that was my impression as well. Do you know how limiting that approach is in practice? I take that any other process perturbing the cache state can make the timing results meaningless, so I'm not sure how that's avoided. The paper, as it often happens, is very eloquent on the strengths of the method, not so much on its weaknessesAs I understand it, this part's a classic cache timing side channel attack. Set up an array of memory locations, get it all in cache making sure to completely fill L1 with your array, ask the victim to do something for you, test array locations to see which ones are slower to read and therefore got evicted. From this, you can retrieve at least some bits of the addresses of memory references (or, in this case, prefetches) done by the victim process.
Yeah, that's the problem with this class of attack. They built attacker and victim processes for the demo which have to run for somewhere on the order of hours of CPU time to extract one key. I have to assume that time gets far worse when there's something else injecting noise into the side channel!Yes, that was my impression as well. Do you know how limiting that approach is in practice? I take that any other process perturbing the cache state can make the timing results meaningless, so I'm not sure how that's avoided. The paper, as it often happens, is very eloquent on the strengths of the method, not so much on its weaknesses![]()
Meh, I think the paper is reasonably clear that not every algorithm/implementation is vulnerable. At no point did they try to imply that every cryptographic library was vulnerable, just that it's highly likely that there are more than the four they identified (which is definitely plausible). It's mostly the media that has blown the issue out of proportion.Interesting but unconfirmed theory from someone I believe works or worked at Apple.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.