ARM’s Memory Tagging Extension, designed to stop memory corruption, can be bypassed via speculative execution. New TIKTAG gadgets leak memory tags with over 95%ARM’s Memory Tagging Extension, designed to stop memory corruption, can be bypassed via speculative execution. New TIKTAG gadgets leak memory tags with over 95%

A Promising ARM Security Feature Isn’t as Bulletproof as It Looks

2025/12/23 11:17
7 min read

:::info Authors:

  1. Juhee Kim
  2. Jinbum Park
  3. Sihyeon Roh
  4. Jaeyoung Chung
  5. Youngjoo Lee
  6. Taesoo Kim
  7. Byoungyoung Lee

:::

Abstract

1. Introduction

2. Background

  • Memory Tagging Extension
  • Speculative Execution Attack

3. Threat Model

4. Finding Tag Leakage Gadgets

  • Tag Leakage Template
  • Tag Leakage Fuzzing

5. TIKTAG Gadgets

  • TIKTAG-v1: Exploiting Speculation Shrinkage
  • TIKTAG-v2: Exploiting Store-to-Load Forwarding

6. Real-World Attacks

6.1. Attacking Chrome

7. Evaluation

8. Related work

9. Conclusion And References

Abstract

ARM Memory Tagging Extension (MTE) is a new hardware feature introduced in ARMv8.5-A architecture, aiming to detect memory corruption vulnerabilities. The low overhead of MTE makes it an attractive solution to mitigate memory corruption attacks in modern software systems and is considered the most promising path forward for improving C/C++ software security. This paper explores the potential security risks posed by speculative execution attacks against MTE.

\ Specifically, this paper identifies new TIKTAG gadgets capable of leaking the MTE tags from arbitrary memory addresses through speculative execution. With TIKTAG gadgets, attackers can bypass the probabilistic defense of MTE, increasing the attack success rate by close to 100%. We demonstrate that TIKTAG gadgets can be used to bypass MTE-based mitigations in real-world systems, Google Chrome and the Linux kernel.

\ Experimental results show that TIKTAG gadgets can successfully leak an MTE tag with a success rate higher than 95% in less than 4 seconds. We further propose new defense mechanisms to mitigate the security risks posed by TIKTAG gadgets.

Introduction

Memory corruption vulnerabilities present significant security threats to computing systems. Exploiting a memory corruption vulnerability, an attacker corrupts the data stored in a memory, hijacking the control flow or crafting the data of the victim. Such exploitation allows the attacker to execute arbitrary code, escalate its privilege, or leak security-sensitive data, critically harming the security of the computing system.

\ In response to these threats, ARM Memory Tagging Extension (MTE) has recently been proposed since ARMv8.5- A architecture, which is a new hardware extension to mitigate memory corruption attacks. Technically, MTE provides two hardware primitive operations, (i) tag and (ii) tag check. A tag operation assigns a tag to a memory location (i.e., a 4-bit tag to each 16-byte memory).

\ Then a tag check operation is performed when accessing the memory, which compares two tags, one embedded within the pointer to access the memory and the other associated with the memory location to-be-accessed. If these two tags are the same, the access is allowed. Otherwise, the CPU raises a fault.

\ Using MTE, various mitigation techniques can be developed depending on which tag is assigned or which memory regions are tagged. For instance, MTE-supported memory allocators, such as Android Scudo [3] and Chrome PartitionAlloc [2], assign a random tag for all dynamically allocated memory. Specifically, a memory allocator is modified to assign a random tag for each allocation.

\ Then, a pointer to this allocated memory embeds the tag, and as the pointer is propagated, the tag is accordingly propagated together. When any dynamically allocated memory is accessed, a tag check operation is enforced. As the tags are randomly assigned at runtime, it is difficult for the attacker to correctly guess the tag. Thus tag check operation would statistically detect memory corruptions.

\ MTE introduces significant challenges for attackers to exploit the memory corruption vulnerability. This is because MTE-based solutions detect a violation behavior close to the root cause of spatial and temporal memory corruptions. Specifically, since MTE ensures that the relationship between a pointer and a memory location is not corrupted, it promptly detects the corruptions—i.e., MTE promptly detects the moment when out-of-bounds access takes place in a heap-overflow vulnerability or when a dangling pointer is dereferenced in use-after-free.

\ This offers strong security advantages to MTE, particularly compared to popular mitigation techniques such as CFI [6, 52, 62], which does not detect memory corruption but detects control-flow hijack behavior (i.e., an exploitation behavior). For these reasons, MTE is considered the most promising path forward for improving C/C++ software security by many security experts [11, 47], since its first adoption with the Pixel 8 device in October 2023.

\ In this paper, we study if MTE provides the security assurance as it is promised. In particular, we analyzed if speculative execution attacks can be a security threat to breaking MTE. To summarize our results, we found that speculative execution attacks are indeed possible against MTE, which severely harms the security assurance of MTE. We discovered two new gadgets, named TIKTAG-v1 and TIKTAG-v2, which can leak the MTE tag of an arbitrary memory address.

\ Specifically, TIKTAG-v1 exploits the speculation shrinkage of the branch prediction and data prefetchers, and TIKTAGv2 exploits the store-to-load forwarding behavior. To demonstrate the exploitability of real-world MTEbased mitigations, we developed two real-world attacks having distinctive attack surfaces: Google Chrome and the Linux kernel. Our evaluation results show that TIKTAG gadgets can leak MTE tags with a success rate higher than 95% in less than 4 seconds.

\ We further propose mitigation schemes to prevent the exploitation of TIKTAG gadgets while retaining the benefits of using MTE. Compared to the previous works on MTE sidechannels [22, 38], we think this paper makes unique contributions for the following reasons. First, Project Zero at Google reported that they were not able to find speculative tag leakage from the MTE mechanisms [38]. They concluded that speculative MTE check results do not induce distinguishable cache state differences between the tag check success and failure.

\ In contrast, we found that tag checks indeed generate the cache state difference in speculative execution. Another independent work, StickyTags [22], discovered an MTE tag leakage gadget, which is one example of the TIKTAG-v1 gadget, and suspected that the root cause is in the memory contention on spurious tag check faults. On the contrary, this paper performed an in-depth analysis, which identified that the speculation shrinkage in branch prediction and data prefetchers are the root cause of the TIKTAG-v1 gadget.

\ This paper additionally reports new MTE tag leakage gadgets, specifically the variants of TIKTAGv1 gadget and the new TIKTAG-v2 gadget, along with developing exploitation against Chrome and the Linux kernel. Furthermore, this paper proposes new defense mechanisms to prevent TIKTAG gadgets from leaking MTE tags, both at hardware and software levels. At the time of writing, MTE is still in the early stages of adoption.

\ Considering its strong security advantage, it is expected that a large number of MTE-based mitigations (e.g., sensitive data protection [29, 31] and data-flow integrity [13, 40, 60]) is expected to be deployed in the near future on MTE-supporting devices (e.g., Android mobile phones).

\ As such, the results of this paper, particularly in how TIKTAG gadgets are constructed and how MTE tags can be leaked, shed light on how MTE-based solutions should be designed or how CPU should be implemented at a microarchitectural level. We have open-sourced TIKTAG gadgets at https://github.com/compsec-snu/tiktag to help the community understand the MTE side-channel issues.

\ ==Responsible Disclosure.== We reported MTE tag leakage gadgets to ARM in November 2023. ARM acknowledged and publicly disclosed the issue in December 2023 [34]. Another research group reported a similar issue to ARM and published their findings [22], which were conducted independently from our work.

\ We reported the speculative vulnerabilities in Google Chrome V8 to the Chrome Security Team in December 2023. They acknowledged the issues but decided not to fix the vulnerabilities because the V8 sandbox is not intended to guarantee the confidentiality of memory data and MTE tags. Since the Chrome browser currently does not enable its MTE-based defense by default, we agree with their decision to some extent.

\ However, we think that browser security can be improved if MTE-based defenses are deployed with the countermeasures we suggest (§6.1.4). We also reported the MTE oracles in the Pixel 8 device to the Android Security Team in April 2024. Android Security Team acknowledged the issue as a hardware flaw of Pixel 8, decided to address the issue in Android’s MTE-based defense, and awarded a bounty reward for the report.

\

:::info This paper is available on arxiv under CC 4.0 license.

:::

\

Market Opportunity
Threshold Logo
Threshold Price(T)
$0.007151
$0.007151$0.007151
+1.10%
USD
Threshold (T) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

HitPaw API is Integrated by Comfy for Professional Image and Video Enhancement to Global Creators

HitPaw API is Integrated by Comfy for Professional Image and Video Enhancement to Global Creators

SAN FRANCISCO, Feb. 7, 2026 /PRNewswire/ — HitPaw, a leader in AI-powered visual enhancement solutions, announced Comfy, a global content creation platform, is
Share
AI Journal2026/02/08 09:15
Journalist gives brutal review of Melania movie: 'Not a single person in the theater'

Journalist gives brutal review of Melania movie: 'Not a single person in the theater'

A Journalist gave a brutal review of the new Melania documentary, which has been criticized by those who say it won't make back the huge fees spent to make it,
Share
Rawstory2026/02/08 09:08
Facts Vs. Hype: Analyst Examines XRP Supply Shock Theory

Facts Vs. Hype: Analyst Examines XRP Supply Shock Theory

Prominent analyst Cheeky Crypto (203,000 followers on YouTube) set out to verify a fast-spreading claim that XRP’s circulating supply could “vanish overnight,” and his conclusion is more nuanced than the headline suggests: nothing in the ledger disappears, but the amount of XRP that is truly liquid could be far smaller than most dashboards imply—small enough, in his view, to set the stage for an abrupt liquidity squeeze if demand spikes. XRP Supply Shock? The video opens with the host acknowledging his own skepticism—“I woke up to a rumor that XRP supply could vanish overnight. Sounds crazy, right?”—before committing to test the thesis rather than dismiss it. He frames the exercise as an attempt to reconcile a long-standing critique (“XRP’s supply is too large for high prices”) with a rival view taking hold among prominent community voices: that much of the supply counted as “circulating” is effectively unavailable to trade. His first step is a straightforward data check. Pulling public figures, he finds CoinMarketCap showing roughly 59.6 billion XRP as circulating, while XRPScan reports about 64.7 billion. The divergence prompts what becomes the video’s key methodological point: different sources count “circulating” differently. Related Reading: Analyst Sounds Major XRP Warning: Last Chance To Get In As Accumulation Balloons As he explains it, the higher on-ledger number likely includes balances that aggregators exclude or treat as restricted, most notably Ripple’s programmatic escrow. He highlights that Ripple still “holds a chunk of XRP in escrow, about 35.3 billion XRP locked up across multiple wallets, with a nominal schedule of up to 1 billion released per month and unused portions commonly re-escrowed. Those coins exist and are accounted for on-ledger, but “they aren’t actually sitting on exchanges” and are not immediately available to buyers. In his words, “for all intents and purposes, that escrow stash is effectively off of the market.” From there, the analysis moves from headline “circulating supply” to the subtler concept of effective float. Beyond escrow, he argues that large strategic holders—banks, fintechs, or other whales—may sit on material balances without supplying order books. When you strip out escrow and these non-selling stashes, he says, “the effective circulating supply… is actually way smaller than the 59 or even 64 billion figure.” He cites community estimates in the “20 or 30 billion” range for what might be truly liquid at any given moment, while emphasizing that nobody has a precise number. That effective-float framing underpins the crux of his thesis: a potential supply shock if demand accelerates faster than fresh sell-side supply appears. “Price is a dance between supply and demand,” he says; if institutional or sovereign-scale users suddenly need XRP and “the market finds that there isn’t enough XRP readily available,” order books could thin out and prices could “shoot on up, sometimes violently.” His phrase “circulating supply could collapse overnight” is presented not as a claim that tokens are destroyed or removed from the ledger, but as a market-structure scenario in which available inventory to sell dries up quickly because holders won’t part with it. How Could The XRP Supply Shock Happen? On the demand side, he anchors the hypothetical to tokenization. He points to the “very early stages of something huge in finance”—on-chain tokenization of debt, stablecoins, CBDCs and even gold—and argues the XRP Ledger aims to be “the settlement layer” for those assets.He references Ripple CTO David Schwartz’s earlier comments about an XRPL pivot toward tokenized assets and notes that an institutional research shop (Bitwise) has framed XRP as a way to play the tokenization theme. In his construction, if “trillions of dollars in value” begin settling across XRPL rails, working inventories of XRP for bridging, liquidity and settlement could rise sharply, tightening effective float. Related Reading: XRP Bearish Signal: Whales Offload $486 Million In Asset To illustrate, he offers two analogies. First, the “concert tickets” model: you think there are 100,000 tickets (100B supply), but 50,000 are held by the promoter (escrow) and 30,000 by corporate buyers (whales), leaving only 20,000 for the public; if a million people want in, prices explode. Second, a comparison to Bitcoin’s halving: while XRP has no programmatic halving, he proposes that a sudden adoption wave could function like a de facto halving of available supply—“XRP’s version of a halving could actually be the adoption event.” He also updates the narrative context that long dogged XRP. Once derided for “too much supply,” he argues the script has “totally flipped.” He cites the current cycle’s optics—“XRP is sitting above $3 with a market cap north of around $180 billion”—as evidence that raw supply counts did not cap price as tightly as critics claimed, and as a backdrop for why a scarcity narrative is gaining traction. Still, he declines to publish targets or timelines, repeatedly stressing uncertainty and risk. “I’m not a financial adviser… cryptocurrencies are highly volatile,” he reminds viewers, adding that tokenization could take off “on some other platform,” unfold more slowly than enthusiasts expect, or fail to get to “sudden shock” scale. The verdict he offers is deliberately bound. The theory that “XRP supply could vanish overnight” is imprecise on its face; the ledger will not erase coins. But after examining dashboard methodologies, escrow mechanics and the behavior of large holders, he concludes that the effective float could be meaningfully smaller than headline supply figures, and that a fast-developing tokenization use case could, under the right conditions, stress that float. “Overnight is a dramatic way to put it,” he concedes. “The change could actually be very sudden when it comes.” At press time, XRP traded at $3.0198. Featured image created with DALL.E, chart from TradingView.com
Share
NewsBTC2025/09/18 11:00