News
Hosted on MSN5mon
Apple silicon is vulnerable to side-channel speculative execution attacks "FLOP" and "SLAP" - MSNSLAP, or Data Speculation Attacks via Load Address Prediction, functions by exploiting Apple Silicon's Load Address Predictor, which guesses the next memory address the CPU will use.
Apple hasn't yet released a fix, but it's aware of the Apple Silicon vulnerabilities. The researchers who found SLAP and FLOP notified Apple about a year ago for one flaw, and about six months ago ...
The full names of the new flaws are “Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP)” and “Breaking the Apple M3 CPU via False Load Output Predictions (FLOP).” ...
Speculative execution in Apple Silicon chips like the M2, M3, A15, and A17 boosts performance but also introduces vulnerabilities. Researchers have identified security flaws, SLAP and FLOP ...
“SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon” Authors: Jason Kim, Daniel Genkin, Yuval Yarom 2025. We present SLAP, a new speculative execution attack that arises from ...
SLAPping LAP silly. SLAP abuses the LAP feature found in newer Apple silicon to perform a similar data-theft attack. By forcing LAP to predict the wrong memory address, SLAP can perform attacker ...
SLAP enables an attacker to launch an end-to-end attack on the Safari web browser on devices with M2/A15 chips. ... Apple silicon ran afoul of another side-channel attack called GoFetch.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results