News
Hosted on MSN5mon
Apple silicon is vulnerable to side-channel speculative execution attacks "FLOP" and "SLAP" - MSNSLAP, or Data Speculation Attacks via Load Address Prediction, functions by exploiting Apple Silicon's Load Address Predictor, which guesses the next memory address the CPU will use.
Apple hasn't yet released a fix, but it's aware of the Apple Silicon vulnerabilities. The researchers who found SLAP and FLOP notified Apple about a year ago for one flaw, and about six months ago ...
The full names of the new flaws are “Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP)” and “Breaking the Apple M3 CPU via False Load Output Predictions (FLOP).” ...
Apple silicon was announced five years ago this week, kickstarting one of the most successful periods for the Mac ever.
“SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon” Authors: Jason Kim, Daniel Genkin, Yuval Yarom 2025. We present SLAP, a new speculative execution attack that arises from ...
Speculative execution in Apple Silicon chips like the M2, M3, A15, and A17 boosts performance but also introduces vulnerabilities. Researchers have identified security flaws, SLAP and FLOP ...
SLAPping LAP silly. SLAP abuses the LAP feature found in newer Apple silicon to perform a similar data-theft attack. By forcing LAP to predict the wrong memory address, SLAP can perform attacker ...
Apple is investigating generative AI to accelerate its custom chip design, according to remarks by hardware chief Johny ...
Apple is on thin ice, ... but the two vulnerabilities in SLAP and FLOP were not included. ... The Macs he has worked with range from the 68K era to the very latest Apple Silicon machines.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results