←back to thread

Memory Integrity Enforcement

(security.apple.com)
458 points circuit | 1 comments | | HN request time: 0s | source
Show context
vayup ◴[] No.45192823[source]
> ...attackers must not be able to predict tag values that the system will choose. We address this issue by frequently re-seeding the underlying pseudo-random generator used to select new tags.

This point could use more explanation. The fundamental problem here is the low entropy of the tags (only 4 bits). An attacker who randomly guesses the tags has 1/16 chance of success. That is not fixed by reseeding the PRNG. So I am not sure what they mean.

replies(2): >>45193068 #>>45194288 #
1. shooshx ◴[] No.45194288[source]
At attacher can guess, and has a 1/16 probability to guess right, but they have only one chance to guess because if you guess wrong, the process terminates (if it's a user-process) or the kernel panics (if it's in the kernel), so in the next opportunity you'll have it will be a different tag to guess.