학술논문

PACMAN: Attacking ARM Pointer Authentication With Speculative Execution
Document Type
Periodical
Source
IEEE Micro Micro, IEEE. 43(4):11-18 Aug, 2023
Subject
Computing and Processing
Picture archiving and communication systems
Authentication
Program processors
Codes
Software engineering
Microarchitecture
Computer crashes
Language
ISSN
0272-1732
1937-4143
Abstract
Memory corruption vulnerabilities have resulted in numerous exploits and significant damage to computer systems. ARM Pointer Authentication is a memory corruption mitigation that attempts to mitigate these issues by cryptographically signing pointers at runtime. We present PACMAN, a novel attack methodology that can forge correct pointer signatures and bypass the protection of pointer authentication without causing any crashes using microarchitectural side channels. PACMAN removes the primary barrier to conducting control-flow hijacking attacks on a platform protected with pointer authentication. We built two proof-of-concept attacks showing that PACMAN works across privilege levels on the Apple M1 CPU. We have also released a suite of open-source tools to enable the community to perform future research on Apple Silicon devices.