Schneier on Security 09月29日
iPhone 17新增安全功能:内存完整性执行
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

苹果在iPhone 17中引入了新的硬件/软件安全功能“内存完整性执行”,旨在解决间谍软件等恶意程序利用内存安全漏洞获取未授权系统访问权限的问题。该功能基于Arm的内存标记扩展(MTE)技术,通过为每个内存分配生成密码并在硬件层面进行验证,确保只有包含正确密钥的请求才能访问内存区域。苹果工程师将MTE从调试工具转变为实时防御机制,并在不影响处理器和内存性能的前提下,将其深度集成到芯片设计中,为用户提供持续的安全保护。

🔒 内存完整性执行是苹果在iPhone 17中引入的新安全功能,旨在解决内存安全漏洞问题。该功能基于Arm的内存标记扩展(MTE)技术,通过为每个内存分配生成密码并在硬件层面进行验证,确保只有包含正确密钥的请求才能访问内存区域。

🛡️ 该功能通过实时监控和验证内存访问请求,有效防止间谍软件等恶意程序利用内存安全漏洞获取未授权系统访问权限。苹果工程师将MTE从调试工具转变为实时防御机制,为用户提供持续的安全保护。

🚀 苹果工程师在深度集成该功能到芯片设计的同时,确保了处理器和内存性能不受影响。通过优化算法和硬件架构,内存完整性执行能够在不影响设备运行速度的前提下,为用户提供强大的安全防护。

Apple has introduced a new hardware/software security feature in the iPhone 17: “Memory Integrity Enforcement,” targeting the memory safety vulnerabilities that spyware products like Pegasus tend to use to get unauthorized system access. From Wired:

In recent years, a movement has been steadily growing across the global tech industry to address a ubiquitous and insidious type of bugs known as memory-safety vulnerabilities. A computer’s memory is a shared resource among all programs, and memory safety issues crop up when software can pull data that should be off limits from a computer’s memory or manipulate data in memory that shouldn’t be accessible to the program. When developers—­even experienced and security-conscious developers—­write software in ubiquitous, historic programming languages, like C and C++, it’s easy to make mistakes that lead to memory safety vulnerabilities. That’s why proactive tools like special programming languages have been proliferating with the goal of making it structurally impossible for software to contain these vulnerabilities, rather than attempting to avoid introducing them or catch all of them.

[…]

With memory-unsafe programming languages underlying so much of the world’s collective code base, Apple’s Security Engineering and Architecture team felt that putting memory safety mechanisms at the heart of Apple’s chips could be a deus ex machina for a seemingly intractable problem. The group built on a specification known as Memory Tagging Extension (MTE) released in 2019 by the chipmaker Arm. The idea was to essentially password protect every memory allocation in hardware so that future requests to access that region of memory are only granted by the system if the request includes the right secret.

Arm developed MTE as a tool to help developers find and fix memory corruption bugs. If the system receives a memory access request without passing the secret check, the app will crash and the system will log the sequence of events for developers to review. Apple’s engineers wondered whether MTE could run all the time rather than just being used as a debugging tool, and the group worked with Arm to release a version of the specification for this purpose in 2022 called Enhanced Memory Tagging Extension.

To make all of this a constant, real-time defense against exploitation of memory safety vulnerabilities, Apple spent years architecting the protection deeply within its chips so the feature could be on all the time for users without sacrificing overall processor and memory performance. In other words, you can see how generating and attaching secrets to every memory allocation and then demanding that programs manage and produce these secrets for every memory request could dent performance. But Apple says that it has been able to thread the needle.

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

iPhone 17 内存完整性执行 内存安全 苹果 间谍软件 Arm Memory Tagging Extension
相关文章