Blog
1 day ago
A Promising ARM Security Feature Isn’t as Bulletproof as It Looks
ARM’s Memory Tagging Extension, designed to stop memory corruption, can be bypassed via speculative execution. New TIKTAG gadgets leak memory tags with over 95% success, undermining MTE’s security guarantees in real systems like Google Chrome and the Linux kernel.
Source: HackerNoon →