Abstract | ||
---|---|---|
Instead of making the CPU execute malware, I/O attacks exploit peripheral devices and, as such, can't be detected by traditional anti-malware techniques. The proposed multipurpose FPGA-based tool can help analyze such attacks and be programmed to mimic a malicious I/O controller, host a Trojan horse, and even apply fuzzing techniques to identify vulnerabilities that could be exploited from I/O controllers or peripheral devices. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/MSP.2013.79 | Security & Privacy, IEEE |
Keywords | Field | DocType |
field programmable gate arrays,invasive software,microcomputers,peripheral interfaces,I/O attack,I/O controller,Trojan horse,antimalware technique,fuzzing technique,multipurpose FPGA-based tool,peripheral device,I/O attacks,fuzzing,vulnerability analysis | Control theory,Central processing unit,Fuzz testing,Computer science,Computer security,Exploit,Input/output,Trojan horse,Memory management,Malware,Embedded system | Journal |
Volume | Issue | ISSN |
12 | 2 | 1540-7993 |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Fernand Lone Sang | 1 | 0 | 0.34 |
Vincent Nicomette | 2 | 115 | 20.90 |
Yves Deswarte | 3 | 1142 | 156.24 |