首页> 外文会议>International Conference on Intelligent Data Acquisition and Advanced Computing Systems >New possibilities for memory acquisition by enabling DMA using network card
【24h】

New possibilities for memory acquisition by enabling DMA using network card

机译:通过使用网卡启用DMA进行内存获取的新可能性

获取原文

摘要

Direct memory access is one of the techniques used in forensic analysis and rootkit detection. Unfortunately, it can also be misused in various attacks. E.g., the firewire attack enabled bypassing of Windows authorization by reading the user password stored in memory. Thus, for security reasons, firewire port is usually disabled in many computers. This motivates a search for a new ways of enabling direct memory access. Another potential avenue for DMA enabled memory access seems to be the network card. We designed a new solution for direct memory access, based on a custom NDIS protocol driver that can send (on request of the local executable program) the contents of the computer memory over the network. Our new method allows an unexpected type of the direct memory access, which is independent of the processor, and its control capabilities. This is a strong advantage in rootkit detection, because the rootkit cannot take any action to hide itself while the memory is scanned.
机译:直接内存访问是法医分析和rootkit检测中使用的技术之一。不幸的是,它也可能在各种攻击中被滥用。例如,firewire攻击通过读取存储在内存中的用户密码来绕过Windows授权。因此,出于安全原因,通常在许多计算机中都禁用了火线端口。这激发了寻找一种启用直接内存访问的新方法的动力。启用DMA的内存访问的另一个潜在途径似乎是网卡。我们基于自定义的NDIS协议驱动程序设计了一种直接内存访问的新解决方案,该驱动程序可以通过网络发送(应本地可执行程序的请求)计算机内存的内容。我们的新方法允许意外类型的直接内存访问,这种访问独立于处理器及其控制功能。这是Rootkit检测的强大优势,因为在扫描内存时,Rootkit无法采取任何措施来隐藏自身。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号