Brazilian Computer Society. Journal | |
IOMMU protection against I/O attacks: a vulnerability and a proof of concept | |
É1  ric Alata2  Mohamed Kaâ3  Benoî3  t Morgan4  niche4  Vincent Nicomette5  | |
[1] Analyse et d’Architecture des SystèINSA Toulouse, Toulouse, France;Laboratoire d’mes (LAAS-CNRS), Toulouse, France | |
关键词: Security; IOMMU; Firmware; Linux; Vulnerability; Attack; | |
DOI : 10.1186/s13173-017-0066-7 | |
学科分类:农业科学(综合) | |
来源: Springer U K | |
【 摘 要 】
Input/output (I/O) attacks have received increasing attention during the last decade. These attacks are performed by malicious peripherals that make read or write accesses to DRAM memory or to memory embedded in other peripherals, through DMA (Direct Memory Access) requests. Some protection mechanisms have been implemented in modern architectures to face these attacks. A typical example is the IOMMU (Input-Output Memory Management Unit). However, such mechanisms may not be properly configured and used by the firmware and the operating system. This paper describes a design weakness that we discovered in the configuration of an IOMMU and a possible exploitation scenario that would allow a malicious peripheral to bypass the underlying protection mechanism. The exploitation scenario is implemented for Intel architectures, with a PCI Express peripheral Field Programmable Gate Array, based on Intel specifications and Linux source code analysis. Finally, as a proof of concept, a Linux rootkit based on the attack presented in this paper is implemented.
【 授权许可】
CC BY
【 预 览 】
Files | Size | Format | View |
---|---|---|---|
RO201902191930186ZK.pdf | 810KB | download |