International audienceI/O attacks have received increasing attention during the last decade. These attacks are performed by malicious peripherals that make read or write accesses to DRAM memory or to memory embedded in other peripherals, through DMA (Direct Memory Access) requests. Some protection mechanisms have been implemented in modern architectures to face these attacks. A typical example is the IOMMU (Input Output Memory Management Unit). However, such mechanisms may not be properly configured and used by the firmware and the operating system. This paper describes a design weakness that we discovered in the configuration of an IOMMU and a possible exploitation scenario that would allow a malicious peripheral to bypass the underlying p...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
International audienceI/O attacks have received increasing attention during the last decade. These a...
International audienceAttacks targeting computer systems become more and more complex and various. S...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Nowadays, attacks against computer systems may involve hardware components in order to bypass the nu...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
IOMMUs are hardware devices that trans-late device DMA addresses to proper ma-chine physical address...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...
International audienceI/O attacks have received increasing attention during the last decade. These a...
International audienceAttacks targeting computer systems become more and more complex and various. S...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Nowadays, attacks against computer systems may involve hardware components in order to bypass the nu...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
IOMMUs are hardware devices that trans-late device DMA addresses to proper ma-chine physical address...
Hardware designers invest a significant design effort when implementing computationally intensive cr...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Run-time attacks have plagued computer systems for more than three decades, with control-flow hijack...