GoFetch

From Wikipedia, the free encyclopedia

Date discoveredprivately disclosed to Apple on 5 December 2023; 2 years ago (2023-12-05),[1] public announcement on 20 March 2024; 2 years ago (2024-03-20)[1]
DiscovererBoru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
Affected hardwareApple silicon CPUs (M1, M2, M3 and A14)
GoFetch
The GoFetch project logo
Date discoveredprivately disclosed to Apple on 5 December 2023; 2 years ago (2023-12-05),[1] public announcement on 20 March 2024; 2 years ago (2024-03-20)[1]
DiscovererBoru Chen, Yingchen Wang, Pradyumna Shome, Christopher W. Fletcher, David Kohlbrenner, Riccardo Paccagnella, Daniel Genkin
Affected hardwareApple silicon CPUs (M1, M2, M3 and A14)
Websitehttps://gofetch.fail/

GoFetch is a family of cryptographic attacks on some Apple silicon chips that exploits the CPU's on-chip data memory-dependent prefetcher (DMP) to investigate the contents of memory.[2][1]

References

Related Articles

Wikiwand AI