Exploiting an I/OMMU vulnerability | IEEE Conference Publication | IEEE Xplore

Exploiting an I/OMMU vulnerability


Abstract:

It is difficult to protect an operating system kernel in an efficient way. Attackers can corrupt or subvert it by two different means: (1) the CPU; (2) the Direct Memory ...Show More

Abstract:

It is difficult to protect an operating system kernel in an efficient way. Attackers can corrupt or subvert it by two different means: (1) the CPU; (2) the Direct Memory Access (DMA) capability of I/O controllers. DMA-based attacks can be blocked using an I/OMMU. This component, embedded in most of current chipsets, enables the operating system to virtualize the main memory for I/O controllers and to restrict their access to only some memory regions. In this paper, we present different vulnerabilities we identified on Intel VT-d, which implements an I/OMMU. An example of exploitation of one of them is then detailed. Finally, we give some recommendations to prevent these vulnerabilities from being used for malicious purposes.
Date of Conference: 19-20 October 2010
Date Added to IEEE Xplore: 13 December 2010
ISBN Information:
Conference Location: Nancy, France
Related Articles are not available for this document.

Contact IEEE to Subscribe

References

References is not available for this document.