As explained by the researchers, the GoFetch vulnerability can be exploited by crafting 'chosen inputs to cryptographic operations, in a way where pointer-like values only appear if we have correctly guessed some bits of the secret key.'
No easy mitigation currently exists for this vulnerability, as it resides in the hardware.
#gofetch-vulnerability #apple-chips #data-memory-dependent-prefetcher #key-extraction #cryptographic-applications
Collection
[
|
...
]