This study shows that ARM’s Memory Tagging Extension can be reliably bypassed in Chrome and the Linux kernel through speculative tag leakage, enabling real-worldThis study shows that ARM’s Memory Tagging Extension can be reliably bypassed in Chrome and the Linux kernel through speculative tag leakage, enabling real-world

Why Hardware Memory Tagging Isn’t the Security Silver Bullet It Promised to Be

Abstract

1. Introduction

2. Background

  • Memory Tagging Extension
  • Speculative Execution Attack

3. Threat Model

4. Finding Tag Leakage Gadgets

  • Tag Leakage Template
  • Tag Leakage Fuzzing

5. TIKTAG Gadgets

  • TIKTAG-v1: Exploiting Speculation Shrinkage
  • TIKTAG-v2: Exploiting Store-to-Load Forwarding

6. Real-World Attacks

6.1. Attacking Chrome

7. Evaluation

8. Related work

9. Conclusion And References

\

Evaluation

In this section, we evaluate the TIKTAG gadgets and MTE bypass exploits in two MTE-enabled systems, the Chrome browser (§7.1) and the Linux kernel (§7.2). All experiments were conducted on the Google Pixel 8 devices.

\ 7.1. Chrome Browser Tag Leakage

We evaluated the TIKTAG-v2 gadget in the V8 JavaScript engine in two environments:

i) the standalone V8 JavaScript engine, and

ii) the Chromium application. The V8 JavaScript engine runs as an independent process, reducing the interference from the Android platform. The Chromium application runs as an Android application, subject to the Android’s application management such as process scheduling and thermal throttling. The experiments were conducted with the V8 v12.1.10 and Chromium v119.0.6022.0 release build.

\ We leveraged MTE random tagging schemes provided by the underlying allocators (Table 1). The standalone V8 used the Scudo allocator [3] (i.e., Android default allocator), which supports 16 random tags for random tagging and offers the OddEvenTags option. When OddEvenTags is enabled, Scudo alternates odd and even random tags for neighboring objects, preventing linear overflow (i.e., OVERFLOWTUNING). When OddEvenTags is disabled, Scudo utilizes all 16 random tags for every object to maximize tag entropy for use-afterfree detection (i.e., UAFTUNING).

\ By default, OddEvenTags is enabled, while we evaluate both settings. Upon releasing an object, Scudo sets a new random tag that does not collide with the previous one. PartitionAlloc (i.e., Chrome default allocator) utilizes 15 random tags and reserves the tag 0x0 for unallocated memory. When releasing an object, PartitionAlloc increments the tag by one, making the tag of the re-allocated memory address predictable. However, in real-world exploits, it is challenging to precisely control the number of releases for a specific address, thus we assume the attacker still needs to leak the tag after each allocation.

\ For the evaluation, we constructed the TIKTAG-v2 gadget in JavaScript (Figure 6) and developed MTE bypass attacks as described in §6.1.3. These attacks exploit artificial vulnerabilities designed to mimic real-world renderer vulnerabilities, specifically linear overflow [44] and use-after-free [42]. We developed custom JavaScript APIs to allocate, free, locate, and access the renderer object to manipulate the memory layout and trigger the vulnerabilities. It’s worth noting that our evaluation shows the best-case performance of MTE bypass attacks since real-world renderer exploits involve

additional overheads in triggering the vulnerabilities and controlling the memory layout.

\ V8 JavaScript Engine. In the standalone V8 JavaScript engine, we evaluated the tag leakage of the TIKTAG-v2 gadget with cache eviction and a memory-based timer. For cache eviction, we used an L1 index-based random eviction set, 500 elements for slow[0] and probe[PROBE_OFFSET], 300 elements for victim.length. The eviction performance of the random eviction set varies on each run, so we repeated the same test 5 times and listed the best result.

\ The random eviction can be optimized with eviction set algorithms [70]. We used a memory counter-based timer with a custom worker thread incrementing a counter, which is equivalent to the SharedArrayBuffer timer [58]. For all possible tag guesses (i.e., 0x0-0xf), we measured the access latency of probe[PROBE_OFFSET] after the gadget 256 times and determined the guessed tag with the minimum average access latency as the correct tag.

\ Table 2 summarizes the MTE bypass exploit results in V8. For a single tag leakage, the gadget was successful in all 100 runs (100%), with an average elapsed time of 3.04 seconds. MTE bypass exploits were evaluated over 100 runs for each vulnerability and OddEvenTags configuration (i.e., disabled (0) and enabled (1)). We excluded linear overflow exploit with OddEvenTags enabled, since the memory corruption is always detected with spatially adjacent objects tagged with different tags and the attack would always fail.

\ The results demonstrate that the attacks were successful in over 97% of the runs, with an average elapsed time of 6 to 13 seconds. In use-after-free exploits, enabling OddEvenTags decreased the average elapsed time by around 40%, due to the decrease in tag entropy from 16 to 8, doubling the chance of tag collision between the temporally adjacent objects.

\ Chromium Application. In the Chromium application setting, we evaluated the TIKTAG-v2 gadget with cache flushing and a SharedArrayBuffer-based timer. Unlike V8, random eviction did not effectively evict cache lines, so we manually flushed the cache lines with dc civac instruction. We attribute this to the aggressive resource management of Android, which can be addressed in the future with cache eviction algorithms tailored for mobile applications.

\ To measure the cache eviction set overhead, we included the cache eviction set traversals in all experiments, using the same cache eviction configuration of the V8 experiments. We measured access latency with a SharedArrayBuffer-based timer as suggested by web browser speculative execution studies [8, 21]. The MTE bypass exploits experiments were conducted in the same manner as the V8 experiments. Table 3 shows the MTE bypass exploit results in the Chromium application.

\ The tag leakage of the TIKTAG-v2 gadget in the Chromium application was successful in 95% of 100 runs, with an average elapsed time of 2.54 seconds. With the MTE bypass exploits, success rates were over 95% for both vulnerability types, with an average elapsed time of 16.11 and 21.90 seconds for linear overflow and use-afterfree, respectively.

\ 7.2. Linux Kernel Tag Leakage

The experiments were conducted on the Android 14 kernel v5.15 using the default configuration. We used 15 random tags (i.e., 0x0–0xe) for kernel objects, as tag 0xf is commonly reserved for the access-all tag in the Linux kernel [37]. The cache line eviction of kernel address cond_ptr to trigger the speculative execution was achieved by cache line bouncing [25] from the user space.

\ For cache measurement, we utilized the virtual counter (i.e., CNTVCT_EL0) to determine the cache hit or miss with the threshold 1.0, which is accessible from the user space. As the virtual counter has a lower resolution (24.5MHz) than the CPU cycle frequency (2.4-2.9 GHz), the accuracy of the cache hit rate is lower than the physical CPU counter-based measurements in §5. The access time was measured in the user space or kernel space, depending on the experiment.

\ Kernel Context Evaluation. We first evaluated whether TIKTAG gadgets can leak MTE tags in the Linux kernel context (Figure 11). We created custom system calls containing TIKTAG-v1 (Figure 2) and TIKTAG-v2 (Figure 6) gadgets and executed them by calling the system calls from the user space. In CHECK, we accessed the guessptr that holds either the correct or wrong tag Tg. In TEST, testptr pointed to

\ either a kernel address or a user space address, depending on whether the cache state difference was measured in the kernel or user space. When we leveraged a user space address as testptr, we passed a user buffer pointer to the kernel space as a system call argument and accessed the pointer in TEST using copyto_user(). The user space address was flushed in the user space before the system call invocation, and the cache state was measured after the system call returned.

\ When we used a kernel address as test_ptr, the cache flush and measurement were performed in the kernel. Each experiment measured the access time over 1000 runs. When executing TIKTAG-v1 in the kernel context, the MTE tag leakage was feasible in both the kernel and user space, where the user space measurement results are shown in Figure 11a.

\ Compared to the user space gadget evaluation (Figure 3), the kernel context required more loads in CHECK to distinguish the cache state difference. Specifically, the cache state difference was discernible from 4 loads in the kernel context, while the user space context required only 2 loads.

\ This can be attributed to the noises from the kernel to the user space context switch overhead, such that the cache hit rates of the tag match cases were lower (i.e., under 90%) than the user space gadget evaluation (i.e., 100%). When executing the TIKTAG-v2 gadget in the kernel space, MTE tag leakage was observed only in the kernel space (Figure 11b).

\ When we measured the access latency of test_ptr in the user space, the gadget did not exhibit a cache state difference. Although the TIKTAG-v2 gadget might not be directly exploitable in the user space, cache state amplification techniques [21, 72] could be utilized to make it observable from the user space.

\ Kernel MTE Bypass Exploit. We evaluated MTE bypass exploits in the Linux kernel with two TIKTAG-v1 gadgets: an artificial TIKTAG-v1 gadget with 8 loads in CHECK (i.e., artificial) and a real-world TIKTAG-v1 gadget in sndtimeruserread() (Figure 10). The artificial gadget evaluates the best-case performance of MTE bypass attacks, while the sndtimeruserread() gadget demonstrates realworld exploit performance.

\ Both gadgets were triggered by invoking the system call containing the gadget from the user space, leveraging a user space address as testptr, and measuring the access latency of testptr in user space. We conducted a tag leakage attack and MTE bypass attack for each gadget. For the MTE bypass attack, we synthesized a buffer overflow vulnerability.

\ Each gadget dereferenced the vulnerable pointer (i.e., guess_ptr) to trigger tag checks; an out-of-bounds pointer and a dangling pointer for the buffer overflow and use-after-free exploits, respectively. The exploit methodology followed the process described in §D.

\ summarizes the MTE bypass exploit results. For a single tag leakage, the gadgets successfully leaked the correct tag in all 100 runs (100%), with an average elapsed time of 0.12 seconds in the artificial gadget, and 3.38 seconds in the sndtimeruser_read() gadget. The MTE bypass exploit for the artificial TIKTAG-v1 gadget was successful in all 100 runs (100%), with an average elapsed time of 0.18 seconds.

\ Regarding the MTE bypass exploit for the sndtimeruserread() gadget, the success rate was 97% with an average elapsed time of 6.86 seconds. As the sndtimeruserread() gadget involves complex kernel function calls and memory accesses, the performance of the MTE bypass exploit is slightly lower compared to the artificial gadget. Nevertheless, it still demonstrates a high success rate within a reasonable time frame.

:::info Authors:

  1. Juhee Kim
  2. Jinbum Park
  3. Sihyeon Roh
  4. Jaeyoung Chung
  5. Youngjoo Lee
  6. Taesoo Kim
  7. Byoungyoung Lee

:::

:::info This paper is available on arxiv under CC 4.0 license.

:::

\

Market Opportunity
WHY Logo
WHY Price(WHY)
$0.00000001619
$0.00000001619$0.00000001619
+12.97%
USD
WHY (WHY) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Unleashing A New Era Of Seller Empowerment

Unleashing A New Era Of Seller Empowerment

The post Unleashing A New Era Of Seller Empowerment appeared on BitcoinEthereumNews.com. Amazon AI Agent: Unleashing A New Era Of Seller Empowerment Skip to content Home AI News Amazon AI Agent: Unleashing a New Era of Seller Empowerment Source: https://bitcoinworld.co.in/amazon-ai-seller-tools/
Share
BitcoinEthereumNews2025/09/18 00:10
Coinbase On-Chain Lending: Unleash Impressive USDC Yields Up to 10.8%

Coinbase On-Chain Lending: Unleash Impressive USDC Yields Up to 10.8%

BitcoinWorld Coinbase On-Chain Lending: Unleash Impressive USDC Yields Up to 10.8% Are you looking for smarter ways to make your digital assets work for you? The world of cryptocurrency is constantly evolving, and a significant development has just arrived. Coinbase has launched an innovative Coinbase on-chain lending service for USDC, promising attractive yields. This exciting new offering allows users to earn up to 10.8% on their stablecoin holdings, opening up fresh opportunities for crypto enthusiasts and investors alike. What is Coinbase On-Chain Lending and How Does it Work? Coinbase’s new on-chain lending service is a groundbreaking step, bringing decentralized finance (DeFi) opportunities directly to its user base. This feature, as reported by The Block, is built on the robust Base network and powered by leading DeFi protocols Morpho and Steakhouse Financial. In essence, it bridges the gap between traditional crypto exchanges and the dynamic world of on-chain yield generation. Seamless Deposit Process: When you deposit USDC, Coinbase simplifies the process by creating a dedicated smart contract wallet for your funds. Optimized Yield: This smart contract then intelligently connects your USDC to multiple lending pools across the Base network. The goal is to optimize returns, ensuring you get the best possible yield. Immediate Earnings: You start earning yield right away, without any complex setup. Flexible Withdrawals: Importantly, you maintain control. Users can withdraw their funds at any time, offering crucial liquidity. This initiative makes high-yield opportunities, traditionally complex for many, incredibly accessible through the familiar Coinbase interface. It’s a powerful blend of security, simplicity, and earning potential. Maximizing Your Returns: The Power of Morpho and Base Network The impressive yields, reaching up to 10.8%, are not magic; they are the result of sophisticated underlying technology. Morpho and Steakhouse Financial, operating on the Base network, are key players in making this possible. Morpho, for instance, is known for its optimized lending protocols that aim to offer better rates by matching lenders and borrowers more efficiently. The Base network, developed by Coinbase itself, provides a secure, low-cost, and developer-friendly environment for decentralized applications. Its integration means that the Coinbase on-chain lending service benefits from: Enhanced Security: Leveraging the robust security of the underlying Ethereum network. Lower Transaction Costs: Making participation more economical for users. Scalability: Ensuring the service can handle a growing number of users and transactions efficiently. Moreover, the use of a smart contract wallet means your funds are managed transparently on the blockchain. This transparency is a cornerstone of DeFi, allowing users to verify transactions and the operational logic of the lending pools. Why Choose Coinbase for On-Chain Lending? For many, the world of decentralized finance can seem daunting due to its technical complexity and the perceived risks. Coinbase’s entry into on-chain lending significantly lowers this barrier. Here’s why this platform stands out: Trust and Reliability: Coinbase is a regulated and publicly traded company, bringing a layer of trust that is often missing in the broader DeFi landscape. User-Friendly Experience: The service is integrated directly into the Coinbase platform, making it incredibly easy for existing users to participate without navigating external DeFi protocols. Simplified Access: It abstracts away the complexities of interacting directly with smart contracts, setting up MetaMask, or managing gas fees for multiple protocols. Optimized Performance: By connecting to multiple lending pools, Coinbase aims to provide consistently competitive yields, taking the guesswork out of finding the best rates. Ultimately, this offering aims to democratize access to high-yield opportunities, making them available to a wider audience who might otherwise shy away from the intricacies of DeFi. Navigating the On-Chain Lending Landscape: Risks and Rewards While the prospect of earning up to 10.8% on your USDC is undeniably attractive, it is crucial to understand that all financial endeavors carry some level of risk. Coinbase on-chain lending, while designed for security and ease of use, is no exception. Potential risks include: Smart Contract Vulnerabilities: Although extensively audited, smart contracts can theoretically have bugs or exploits. Market Volatility: While USDC is a stablecoin, the underlying value of the assets in lending pools can fluctuate, affecting overall returns or, in extreme cases, principal. Protocol Risks: The performance of Morpho and Steakhouse Financial directly impacts the service. However, Coinbase’s involvement provides a layer of institutional oversight and expertise that can help mitigate some of these risks. They conduct due diligence on the protocols used and aim to provide a secure environment. Users should always perform their own research and understand the dynamics of on-chain lending. Conclusion: A New Era for Stablecoin Holders The launch of Coinbase on-chain lending for USDC marks a significant milestone in the evolution of cryptocurrency services. By combining the accessibility and trust of a major exchange with the high-yield potential of decentralized finance, Coinbase is empowering users to generate passive income on their stablecoin holdings with unprecedented ease. This service not only simplifies participation in DeFi but also sets a new standard for how traditional crypto platforms can integrate innovative on-chain solutions. It’s an exciting development that could redefine how many engage with their digital assets, turning dormant stablecoins into powerful earning tools. Frequently Asked Questions (FAQs) 1. What is Coinbase on-chain lending? Coinbase on-chain lending is a new service that allows users to deposit USDC and earn yields of up to 10.8%. It connects user funds to various lending pools on the Base network, powered by DeFi protocols like Morpho and Steakhouse Financial. 2. How does the 10.8% yield work? When you deposit USDC, Coinbase creates a smart contract wallet that strategically allocates your funds to multiple lending pools to optimize returns, aiming for the highest possible yield, which can reach up to 10.8%. 3. What are the risks involved with Coinbase on-chain lending? Like all DeFi services, risks include potential smart contract vulnerabilities and market volatility affecting underlying assets. However, Coinbase’s institutional oversight and use of audited protocols aim to mitigate some of these risks. 4. Can I withdraw my funds from Coinbase on-chain lending at any time? Yes, one of the key benefits of this service is the flexibility it offers. Users can withdraw their deposited USDC and accrued yield at any time. 5. Which networks and protocols power this service? The service is powered by the Base network, developed by Coinbase, and utilizes decentralized finance protocols such as Morpho and Steakhouse Financial to manage lending pools and optimize yields. 6. Is Coinbase on-chain lending available to all users? Availability may vary based on jurisdiction and regulatory requirements. Users should check the Coinbase platform or their local regulations to confirm eligibility. Did you find this article insightful? Share it with your friends and colleagues on social media to help them discover the exciting opportunities with Coinbase on-chain lending! To learn more about the latest crypto lending trends, explore our article on key developments shaping decentralized finance institutional adoption. This post Coinbase On-Chain Lending: Unleash Impressive USDC Yields Up to 10.8% first appeared on BitcoinWorld.
Share
Coinstats2025/09/19 00:35
Koscom Pursues Korean Won Stablecoin with 5 Trademark Applications

Koscom Pursues Korean Won Stablecoin with 5 Trademark Applications

Detail: https://coincu.com/news/koscom-korean-won-stablecoin-trademark/
Share
Coinstats2025/09/18 18:39