首页> 外文期刊>Brazilian Computer Society. Journal >IOMMU protection against I/O attacks: a vulnerability and a proof of concept
【24h】

IOMMU protection against I/O attacks: a vulnerability and a proof of concept

机译:针对I / O攻击的IOMMU保护:漏洞和概念证明

获取原文
       

摘要

Abstract Input/output (I/O) attacks have received increasing attention during the last decade. These attacks are performed by malicious peripherals that make read or write accesses to DRAM memory or to memory embedded in other peripherals, through DMA (Direct Memory Access) requests. Some protection mechanisms have been implemented in modern architectures to face these attacks. A typical example is the IOMMU (Input-Output Memory Management Unit). However, such mechanisms may not be properly configured and used by the firmware and the operating system. This paper describes a design weakness that we discovered in the configuration of an IOMMU and a possible exploitation scenario that would allow a malicious peripheral to bypass the underlying protection mechanism. The exploitation scenario is implemented for Intel architectures, with a PCI Express peripheral Field Programmable Gate Array, based on Intel specifications and Linux source code analysis. Finally, as a proof of concept, a Linux rootkit based on the attack presented in this paper is implemented.
机译:摘要在过去十年中,输入/输出(I / O)攻击受到越来越多的关注。这些攻击由恶意外围设备执行,这些外围设备通过DMA(直接内存访问)请求对DRAM内存或嵌入在其他外围设备中的内存进行读写访问。在现代体系结构中已经实现了一些保护机制来应对这些攻击。一个典型的示例是IOMMU(输入输出内存管理单元)。但是,固件和操作系统可能无法正确配置和使用此类机制。本文描述了我们在IOMMU的配置中发现的设计弱点以及可能的利用情形,该利用情形将允许恶意外围设备绕过基础保护机制。基于Intel规范和Linux源代码分析,利用PCI Express外围现场可编程门阵列为Intel体系结构实现了利用场景。最后,作为概念证明,基于本文提出的攻击的Linux rootkit被实现。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号