Hosted on MSN29d
Apple silicon is vulnerable to side-channel speculative execution attacks "FLOP" and "SLAP"SLAP, or Data Speculation Attacks via Load Address Prediction, functions by exploiting Apple Silicon's Load Address Predictor, which guesses the next memory address the CPU will use. By exploiting ...
The full names of the new flaws are “Data Speculation Attacks via Load Address Prediction on Apple Silicon (SLAP)” and “Breaking the Apple M3 CPU via False Load Output Predictions (FLOP).” ...
Apple devices running on A- and M-series chips are vulnerable to two newly discovered side-channel attacks that expose sensitive data like credit card information, location history, and private ...
Find the FLOP paper here. “SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon” Authors: Jason Kim, Daniel Genkin, Yuval Yarom 2025. We present SLAP, a new speculative ...
Speculative execution in Apple Silicon chips like the M2, M3, A15, and A17 boosts performance but also introduces vulnerabilities. Researchers have identified security flaws, SLAP and FLOP ...
Apple has been working for some time on fixing both flaws since the company was first notified – in May 2024 for SLAP, and in September 2024 for FLOP.
Apple introduced the first Apple silicon Macs back in 2020, marking the start of its transition away from Intel's chips. Apple's custom chips are Arm-based and are similar to the A-series chips ...
Apple officially confirmed its transition from Intel chips to its own Apple Silicon for the Mac. In addition to details for developers, Tim Cook announced that the first Mac with Apple Silicon ...
The researchers do note that attacks actually using these exploits have yet to be spotted in the wild after initially discovering and reporting them to Apple in March (SLAP) and September (FLOP ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results