Podcast
Root Causes 381: Apple Chip Sideloading Attack Leaks Encryption Keys


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
April 26, 2024
A newly revealed side channel attack enables theft of private keys from M-series Apple chips. We explain.
Podcast Transcript
Lightly edited for flow and brevity.
So Tim, what we are referring to, let's talk about it, Apple, as you know, has come up with their own chipsets for a lot of their laptops. So you'll find MacBook Pros, MacBook Airs, with the new M series chips and what we're talking about here is I think mostly the M1 and M2 generations. There is an M3 at this point in time. So what is going on, Tim, of course, is that some researchers, very good research, has been able to recreate private keys stored in memory. So this is a good old-fashioned side channel attack. And it is caused by - Tim, you're gonna love this.
From what I can tell the root cause of what's going on here is that the optimization - - anytime you're hearing about side channel attacks, quite often what's going on is some sort of memory or process optimization that's leaking information. And isn’t it interesting that in this case, these Apple M1 and M2 chips they're using this new feature, right, the abbreviation DMP. It's not important right now. What's important is that this DMP optimization feature is mistaking private key, of course, and if any of you've ever seen these things, these things are usually hashed so it's a series of alphanumeric characters. Right, Tim?

