Abstract | ||
---|---|---|
For a few years now, attacks involving I/O controllers have been subject to a growing interest. Unlocking smart phones and game consoles through USB connections, or bypassing authentication through Fire Wire are examples of such attacks. Our study focuses on I/O-based attacks targeting Intel PC-based information systems such as laptop or desktop computers. This paper provides a survey of such attacks and proposes a characterization and a classification of these attacks. Then, an overview of various techniques which mitigate the risks related to I/O attacks are described and their respective limitations are discussed. Finally, several I/O attacks we are currently investigating are presented. |
Year | DOI | Venue |
---|---|---|
2011 | 10.1109/SysSec.2011.10 | SYSSEC '11 Proceedings of the 2011 First SysSec Workshop |
Keywords | Field | DocType |
o-based attack,o attack,fire wire,o controller,o attacks,intel pc-based architectures,bypassing authentication,desktop computer,respective limitation,smart phone,usb connection,intel pc-based information system,pci express,operating system,computer network security,registers,computer architecture,direct memory access,operating systems,information system,peripheral device | Information system,Authentication,Laptop,Peer-to-peer,Network security,Input/output,PCI Express,Engineering,Operating system,USB | Conference |
Citations | PageRank | References |
10 | 0.51 | 4 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Fernand Lone Sang | 1 | 10 | 0.51 |
Vincent Nicomette | 2 | 115 | 20.90 |
Yves Deswarte | 3 | 1142 | 156.24 |