Title
I/O Attacks in Intel PC-based Architectures and Countermeasures
Abstract
For a few years now, attacks involving I/O controllers have been subject to a growing interest. Unlocking smart phones and game consoles through USB connections, or bypassing authentication through Fire Wire are examples of such attacks. Our study focuses on I/O-based attacks targeting Intel PC-based information systems such as laptop or desktop computers. This paper provides a survey of such attacks and proposes a characterization and a classification of these attacks. Then, an overview of various techniques which mitigate the risks related to I/O attacks are described and their respective limitations are discussed. Finally, several I/O attacks we are currently investigating are presented.
Year
DOI
Venue
2011
10.1109/SysSec.2011.10
SYSSEC '11 Proceedings of the 2011 First SysSec Workshop
Keywords
Field
DocType
o-based attack,o attack,fire wire,o controller,o attacks,intel pc-based architectures,bypassing authentication,desktop computer,respective limitation,smart phone,usb connection,intel pc-based information system,pci express,operating system,computer network security,registers,computer architecture,direct memory access,operating systems,information system,peripheral device
Information system,Authentication,Laptop,Peer-to-peer,Network security,Input/output,PCI Express,Engineering,Operating system,USB
Conference
Citations 
PageRank 
References 
10
0.51
4
Authors
3
Name
Order
Citations
PageRank
Fernand Lone Sang1100.51
Vincent Nicomette211520.90
Yves Deswarte31142156.24