Title
Exploiting an I/OMMU vulnerability
Abstract
It is difficult to protect an operating system kernel in an efficient way. Attackers can corrupt or subvert it by two different means: (1) the CPU; (2) the Direct Memory Access (DMA) capability of I/O controllers. DMA-based attacks can be blocked using an I/OMMU. This component, embedded in most of current chipsets, enables the operating system to virtualize the main memory for I/O controllers and to restrict their access to only some memory regions. In this paper, we present different vulnerabilities we identified on Intel VT-d, which implements an I/OMMU. An example of exploitation of one of them is then detailed. Finally, we give some recommendations to prevent these vulnerabilities from being used for malicious purposes.
Year
DOI
Venue
2010
10.1109/MALWARE.2010.5665798
Malicious and Unwanted Software
Keywords
Field
DocType
file organisation,operating system kernels,security of data,I/O controllers,I/OMMU vulnerability,Intel VT-d,direct memory access,operating system kernel
Kernel (linear algebra),Central processing unit,Computer science,Computer security,Direct memory access,Operating system kernel,Chipset,restrict,Operating system,Embedded system,Vulnerability
Conference
ISBN
Citations 
PageRank 
978-1-4244-9353-1
22
1.55
References 
Authors
1
4
Name
Order
Citations
PageRank
Fernand Lone Sang1221.55
Éric Lacombe2221.55
Vincent Nicomette3221.55
Yves Deswarte41142156.24