PACMAN: Atacking ARM Pointer Authentication with Speculative Execution

81Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper studies the synergies between memory corruption vulnerabilities and speculative execution vulnerabilities. We leverage speculative execution attacks to bypass an important memory protection mechanism, ARM Pointer Authentication, a security feature that is used to enforce pointer integrity. We present PACMAN, a novel attack methodology that speculatively leaks PAC verifcation results via micro-architectural side channels without causing any crashes. Our attack removes the primary barrier to conducting control-flow hijacking attacks on a platform protected using Pointer Authentication. We demonstrate multiple proof-of-concept attacks of PACMAN on the Apple M1 SoC, the frst desktop processor that supports ARM Pointer Authentication. We reverse engineer the TLB hierarchy on the Apple M1 SoC and expand micro-architectural side-channel attacks to Apple processors. Moreover, we show that the PACMAN attack works across privilege levels, meaning that we can attack the operating system kernel as an unprivileged user in userspace.

Cite

CITATION STYLE

APA

Ravichandran, J., Na, W. T., Lang, J., & Yan, M. (2022). PACMAN: Atacking ARM Pointer Authentication with Speculative Execution. In Proceedings - International Symposium on Computer Architecture (pp. 685–698). Institute of Electrical and Electronics Engineers Inc. https://doi.org/10.1145/3470496.3527429

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free