Speculative Execution Flaws Expose Sensitive Data on Apple Silicon Devices

In light of recent revelations, the latest security concerns specifically targeting Apple silicon devices have brought to light significant vulnerabilities in modern processors. Researchers from the Georgia Institute of Technology and Ruhr University Bochum unveiled two new speculative execution exploits named SLAP (Data Speculation Attacks via Load Address Prediction) and FLOP (Breaking the Apple M3 CPU via False Load Output Predictions), which target web browsers such as Safari and Google Chrome on Apple silicon devices. These findings underscore the ongoing challenge of balancing performance optimization with security in advanced processors.

Speculative execution, an essential performance optimization feature in modern processors, is designed to predict control flow and execute instructions ahead of time. When these predictions are correct, they enhance processor efficiency significantly. However, when a misprediction occurs, the speculative instructions must be discarded. Despite this discarding, traces of these instructions linger within the CPU, which can be exploited through sophisticated side-channel attacks. This issue is at the heart of the new SLAP and FLOP exploits identified by the researchers.

Focusing particularly on Apple silicon’s Load Address Predictor (LAP), SLAP attacks affect the M2, A15, and newer chips. LAP is responsible for predicting the next memory address by analyzing prior access patterns. However, should LAP predict incorrectly, it can execute arbitrary computations on out-of-bounds data, inadvertently granting attackers access to sensitive information. These attacks can reveal private data such as emails or browsing activity. On the other hand, FLOP targets the Load Value Predictor (LVP) of the M3, M4, and A17 chips. By guessing data values returned by memory, FLOP can bypass crucial memory safety checks, presenting avenues to leak sensitive data like location histories, calendar events, and even credit card details.

Speculative Execution and Its Implications

Speculative execution mechanisms, although designed to enhance processor performance, have been found to introduce significant security vulnerabilities. The recent SLAP and FLOP attacks highlight how these mechanisms can be exploited to extract sensitive information, posing serious risks to user privacy and security. These vulnerabilities extend beyond the previously known Spectre and iLeakage attacks by targeting not just the predicted control flows but also the data flows. This shift in focus broadens the scope of exploitation and presents new challenges for designing secure processors.

Extending this analysis, researchers from Korea University have also highlighted the persistent security issues rooted in speculative execution flaws. They presented SysBumps, an attack that breaks kernel address space layout randomization (KASLR) on macOS by exploiting Spectre-type gadgets in system calls. This reinforces the idea that current CPU architectures, particularly those found in Apple silicon, are repeatedly vulnerable to speculative execution attacks and the broader category of side-channel attacks.

To further complicate matters, recent academic research shows that combining multiple side-channels can circumvent existing mitigations when targeting the kernel. The use of address space tagging, intended to mitigate side-channels, has inadvertently opened new attack avenues. One practical demonstration cited is TagBleed, which leverages tagged translation lookaside buffers (TLBs) to effectively derandomize KASLR, overcoming the protections currently in place. This complexity emphasizes the necessity for a comprehensive reevaluation of how security measures are integrated into processor designs, especially in light of these nuanced and multifaceted vulnerabilities.

Broader Impact and Future Directions

Recent discoveries expose major security flaws in Apple silicon devices, highlighting vulnerabilities in modern processors. Scholars from Georgia Institute of Technology and Ruhr University Bochum identified two critical speculative execution exploits called SLAP (Data Speculation Attacks via Load Address Prediction) and FLOP (Breaking the Apple M3 CPU via False Load Output Predictions). These exploits target browsers such as Safari and Google Chrome on Apple silicon devices, showcasing the delicate balance between optimizing performance and maintaining security in advanced processors.

Speculative execution, key for boosting modern processor efficiency, predicts control flow to execute instructions ahead of time. If these predictions are accurate, efficiency improves greatly. However, incorrect predictions lead to discarded instructions that leave traces within the CPU. These remnants can be manipulated through advanced side-channel attacks, pivotal in the SLAP and FLOP exploits.

Specifically, SLAP exploits target Apple silicon’s Load Address Predictor (LAP), impacting M2, A15, and newer chips by predicting the next memory address based on past access. Incorrect LAP predictions can lead to unauthorized computations on out-of-bounds data, allowing attackers to access private data like emails or online activities. FLOP targets the Load Value Predictor (LVP) in M3, M4, and A17 chips, guessing data values from memory and evading crucial safety checks, thus risking exposure of sensitive information such as location, calendar events, and credit card details.

Explore more

How Will the 2026 Social Security Tax Cap Affect Your Paycheck?

In a world where every dollar counts, a seemingly small tweak to payroll taxes can send ripples through household budgets, impacting financial stability in unexpected ways. Picture a high-earning professional, diligently climbing the career ladder, only to find an unexpected cut in their take-home pay next year due to a policy shift. As 2026 approaches, the Social Security payroll tax

Why Your Phone’s 5G Symbol May Not Mean True 5G Speeds

Imagine glancing at your smartphone and seeing that coveted 5G symbol glowing at the top of the screen, promising lightning-fast internet speeds for seamless streaming and instant downloads. The expectation is clear: 5G should deliver a transformative experience, far surpassing the capabilities of older 4G networks. However, recent findings have cast doubt on whether that symbol truly represents the high-speed

How Can We Boost Engagement in a Burnout-Prone Workforce?

Walk into a typical office in 2025, and the atmosphere often feels heavy with unspoken exhaustion—employees dragging through the day with forced smiles, their energy sapped by endless demands, reflecting a deeper crisis gripping workforces worldwide. Burnout has become a silent epidemic, draining passion and purpose from millions. Yet, amid this struggle, a critical question emerges: how can engagement be

Leading HR with AI: Balancing Tech and Ethics in Hiring

In a bustling hotel chain, an HR manager sifts through hundreds of applications for a front-desk role, relying on an AI tool to narrow down the pool in mere minutes—a task that once took days. Yet, hidden in the algorithm’s efficiency lies a troubling possibility: what if the system silently favors candidates based on biased data, sidelining diverse talent crucial

HR Turns Recruitment into Dream Home Prize Competition

Introduction to an Innovative Recruitment Strategy In today’s fiercely competitive labor market, HR departments and staffing firms are grappling with unprecedented challenges in attracting and retaining top talent, leading to the emergence of a striking new approach that transforms traditional recruitment into a captivating “dream home” prize competition. This strategy offers new hires and existing employees a chance to win