Abstract:
It is difficult to protect an operating system kernel in an efficient way. Attackers can corrupt or subvert it by two different means: (1) the CPU; (2) the Direct Memory ...Show MoreMetadata
Abstract:
It is difficult to protect an operating system kernel in an efficient way. Attackers can corrupt or subvert it by two different means: (1) the CPU; (2) the Direct Memory Access (DMA) capability of I/O controllers. DMA-based attacks can be blocked using an I/OMMU. This component, embedded in most of current chipsets, enables the operating system to virtualize the main memory for I/O controllers and to restrict their access to only some memory regions. In this paper, we present different vulnerabilities we identified on Intel VT-d, which implements an I/OMMU. An example of exploitation of one of them is then detailed. Finally, we give some recommendations to prevent these vulnerabilities from being used for malicious purposes.
Date of Conference: 19-20 October 2010
Date Added to IEEE Xplore: 13 December 2010
ISBN Information:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Hardware ,
- Bridges ,
- Registers ,
- Ethernet networks ,
- Kernel
- Index Terms
- Operating System ,
- Memory Regions ,
- Kernel Images ,
- Example Of Manipulation ,
- Data Structure ,
- Local System ,
- Computer System ,
- Access Control ,
- Control In Order ,
- Memory Control ,
- Memory Space ,
- Malware ,
- Hardware Configuration ,
- Access Request ,
- Table Entries ,
- Attack Strategy ,
- Medium Access Control ,
- Physical Memory ,
- Attack Vector ,
- Class Of Attacks ,
- Identical Machines ,
- Physical Address
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Hardware ,
- Bridges ,
- Registers ,
- Ethernet networks ,
- Kernel
- Index Terms
- Operating System ,
- Memory Regions ,
- Kernel Images ,
- Example Of Manipulation ,
- Data Structure ,
- Local System ,
- Computer System ,
- Access Control ,
- Control In Order ,
- Memory Control ,
- Memory Space ,
- Malware ,
- Hardware Configuration ,
- Access Request ,
- Table Entries ,
- Attack Strategy ,
- Medium Access Control ,
- Physical Memory ,
- Attack Vector ,
- Class Of Attacks ,
- Identical Machines ,
- Physical Address