Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access and to efficiently use processing power during data transfers between the main system and a peripheral device. However, this advanced feature opens security vulnerabilities of access compromise and to manipulate the main memory of the victim host machine. The paper outlines a lightweight process that creates resilience against DMA attacks minimal modification to the configuration of the DMA protocol. The proposed scheme performs device identification of the trusted PCIe devices that have DMA capabilities and constructs a database of profiling time to authenticate the trusted devices before they can access the system. The results show that the p...
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) infere...
Software-defined networking (SDN) has received considerable attention and adoption owing to its inhe...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
In device-to-device (D2D) communications, distributed Denial-of-Service (DDoS) attacks can be quite ...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The 5G and beyond wireless networks are critical to support diverse vertical applications by connect...
Recent trends of the use of deep neural networks (DNNs) in mission-critical applications have increa...
The sheer increase in interconnected devices, reaching 50 B in 2025, makes it easier for adversaries...
Contemporary datasets are rapidly growing in size and complexity. This wealth of data is providing a...
© 2015 IEEE. We present a lightweight PUF-based authentication approach that is practical in setting...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) infere...
Software-defined networking (SDN) has received considerable attention and adoption owing to its inhe...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
The significance of security is often overlooked until a catastrophic event occurs. This holds for t...
In device-to-device (D2D) communications, distributed Denial-of-Service (DDoS) attacks can be quite ...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
The sharing of hardware components in modern processors helps to achieve high performance and meet t...
The 5G and beyond wireless networks are critical to support diverse vertical applications by connect...
Recent trends of the use of deep neural networks (DNNs) in mission-critical applications have increa...
The sheer increase in interconnected devices, reaching 50 B in 2025, makes it easier for adversaries...
Contemporary datasets are rapidly growing in size and complexity. This wealth of data is providing a...
© 2015 IEEE. We present a lightweight PUF-based authentication approach that is practical in setting...
With the rapid development of a computer network, our lives are already inseparable from it. Wireles...
Analog compute‐in‐memory (CIM) systems are promising candidates for deep neural network (DNN) infere...
Software-defined networking (SDN) has received considerable attention and adoption owing to its inhe...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...