International audienceAttacks targeting computer systems become more and more complex and various. Some of them, so-called I/O attacks, are performed by malicious peripherals that make read or write accesses to DRAM memory or to memory embedded in other peripherals, through DMA (Direct Memory Access) requests. Some protection mechanisms to face these attacks exist and have been implemented for several years now in modern architectures. A typical example is the IOMMU proposed by Intel. However, such mechanisms are not necessarily properly configured and used by the firmware and the operating system. This experimental paper describes a design weakness that we discovered in the configuration of an IOMMU by the Intel IOMMU Linux driver and a po...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...
International audienceAttacks targeting computer systems become more and more complex and various. S...
International audienceI/O attacks have received increasing attention during the last decade. These a...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
IOMMUs are hardware devices that trans-late device DMA addresses to proper ma-chine physical address...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
The IOMMU allows the OS to encapsulate I/O devices in their own virtual memory spaces, thus restrict...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
A key goal of security architectures is to separate I/O transfers of security-sensitive applications...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...
International audienceAttacks targeting computer systems become more and more complex and various. S...
International audienceI/O attacks have received increasing attention during the last decade. These a...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
IOMMUs are hardware devices that trans-late device DMA addresses to proper ma-chine physical address...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
The IOMMU allows the OS to encapsulate I/O devices in their own virtual memory spaces, thus restrict...
Commodity virtual machine monitors forbid direct ac-cess to I/O devices by untrusted guest operating...
Cyber-Physical system devices nowadays constitute a mixture of Information Technology (IT) and Opera...
The OS kernel is typically preassumed as a trusted computing base in most computing systems. However...
Modern FPGA System-on-Chips (SoCs) combine high performance application processors with reconfigurab...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
A key goal of security architectures is to separate I/O transfers of security-sensitive applications...
Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory atta...
Embedded IoT devices are often built upon large system on chip computing platforms running a signifi...
We describe principles and implementation details of UEFI BIOS attacks and vulnerabilities, suggesti...