Arm hardware security systems might not be as tough as it thinks



New research has detailed a novel way to bypass a security feature built into ARM chips.

A team of cybersecurity researchers from Samsung, Seoul National University, and the Georgia Institute of Technology, named the new approach “TIKTAG”, since it works around the Memory Tagging Extension (MTE) tool.

https://cdn.mos.cms.futurecdn.net/2754485dcea764d0facc736de9d8024c-1200-80.jpg



Source link

Latest articles

spot_imgspot_img

Related articles

spot_imgspot_img