Every computer having a network, USB or disk controller has a Direct Memory Access Controller (DMAC) which is configured by a driver to transfer data between the device and main memory. The DMAC, if wrongly configured, can therefore potentially leak sensitive data and overwrite critical memory to overtake the system. Since DMAC drivers tend to be buggy (due to their complexity), these attacks are a serious threat. This paper presents a general formal framework for modeling DMACs and verifying under which conditions they are isolated. These conditions can be used as a specification for guaranteeing that a driver configures the DMAC correctly. The framework provides general isolation theorems that are common to all DMACs, leaving to the user ...
Modern multicore processors, such as the Cell Broadband Engine, achieve high performance by equippin...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Direct Memory Access /DMA / is previously used to transfer data between the main memory of host comp...
Every computer having a network, USB or disk controller has a Direct Memory Access Controller (DMAC)...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
Abstract—Direct Memory Access (DMA) interfaces are a com-mon and important component of Hardware/Sof...
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access an...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Direct Memory Access (DMA) is frequently used to transfer data between the main memory of a host com...
Abstract: Direct memory access (DMA) is a feature of modern computers that allows certain hardware s...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Pip-MPU is a minimalist separation kernel for constrained devices (scarce memory and power resources...
Modern multicore processors, such as the Cell Broadband Engine, achieve high performance by equippin...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Direct Memory Access /DMA / is previously used to transfer data between the main memory of host comp...
Every computer having a network, USB or disk controller has a Direct Memory Access Controller (DMAC)...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
Abstract—Direct Memory Access (DMA) interfaces are a com-mon and important component of Hardware/Sof...
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access an...
In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA...
Direct Memory Access (DMA) is frequently used to transfer data between the main memory of a host com...
Abstract: Direct memory access (DMA) is a feature of modern computers that allows certain hardware s...
The security of embedded systems can be dramatically improved through the use of formally verified i...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Pip-MPU is a minimalist separation kernel for constrained devices (scarce memory and power resources...
Modern multicore processors, such as the Cell Broadband Engine, achieve high performance by equippin...
Hardware platforms, such as microprocessors and Trusted Execution Environments (TEEs), aim to provid...
Direct Memory Access /DMA / is previously used to transfer data between the main memory of host comp...