8000 GitHub - slap-flop/slap-artifacts: This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear at the 2025 IEEE Symposium on Security and Privacy.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear at the 2025 IEEE Symposium on Security and Privacy.

Notifications You must be signed in to change notification settings

slap-flop/slap-artifacts

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 

Repository files navigation

Proof-of-Concept Code Bundle for SLAP

This bundle contains the reverse engineering code for the LAP, as well as the prerequisites to run these experiments on macOS. We have tested this setup on macOS 14.5 build 23F79. The steps are as follows:

  1. Install the Kernel Debug Kit (KDK) for macOS 14.5 build 23F79.
  2. Follow the README in pacmanpatcher to create a patched version of the development kernel, which allows user code to count cycles.
  3. Follow the README in enable-dc-civac, which is a kernel extension allowing cache flush instructions to run from user code. Here, we also report a bug with kmutil where it uses an incorrect path when looking for a custom kernelcache.
  4. Follow the README in slap for the reverse engineering experiments.

About

This upload contains the artifacts for the paper "SLAP: Data Speculation Attacks via Load Address Prediction on Apple Silicon", to appear at the 2025 IEEE Symposium on Security and Privacy.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published
0