ARM proposed a hardware implementation of tagged memory, referred to MTE (Memory Tagging Extensions) In Part 1 we discussed testing the technical (and implementation) limitations of MTE on the hardware that we've had access to. This post will now consider the implications of what we know on the effectiveness of M TE-based mitigations.

19m read timeFrom googleprojectzero.blogspot.com
Post cover image
Table of contents
BackgroundHow much would MTE hurt attackers?

Sort: