Part 2: Work in ProgressInternational audienceThis paper presents an approach to prevent memory attacks enabled by DMA. DMA is a technique that is frequently used to release processors from simple memory transfers. DMA transfers are usually performed during idle times of the bus. A disadvantage of DMA transfers is that they are primarily unsupervised by anti malware agents. After the completion of a DMA activity the transfered data can be scanned for malicious codes. At this time the malicious structures are already in the memory and processor time is necessary to perform a malware scan. The approach presented in this paper enhances the DMA by a watchdog mechanisms that scans the data passing by and interrupts the processor after the detect...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
International audienceAttacks targeting computer systems become more and more complex and various. S...
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access an...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
Direct Memory Access (DMA) is frequently used to transfer data between the main memory of a host com...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceI/O attacks have received increasing attention during the last decade. These a...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
International audienceAttacks targeting computer systems become more and more complex and various. S...
Direct Memory Access (DMA) is a state-of-the-art technique to optimize the speed of memory access an...
We present a solution for preventing guests in a virtualized system from using direct memory access ...
ARM TrustZone offers a Trusted Execution Environment (TEE) embedded into the processor cores. Some v...
Direct Memory Access (DMA) is frequently used to transfer data between the main memory of a host com...
Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have ...
Over the past decades, the major objectives of computer design have been to improve performance and ...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Separation between processes on top of an operating system or between guests in a virtualized enviro...
Increasingly, cyber attacks (e.g., kernel rootkits) target the inner rings of a computer system, and...
Covert channels a b s t r a c t While general-purpose processor based systems are built to enforce m...
Bugs are prevalent in a large amount of deployed software. These bugs often introduce vulnerabilitie...
International audienceI/O attacks have received increasing attention during the last decade. These a...
The rapid expansion of digital technologies and interconnected systems has brought about an unpreced...
In recent years, several kinds of attacks on cryptographic devices have been developed. The goal of ...
International audienceAttacks targeting computer systems become more and more complex and various. S...