期刊论文详细信息
Brazilian Computer Society. Journal
IOMMU protection against I/O attacks: a vulnerability and a proof of concept
É1  ric Alata2  Mohamed Kaâ3  Benoî3  t Morgan4  niche4  Vincent Nicomette5 
[1] Analyse et d’Architecture des SystèINSA Toulouse, Toulouse, France;Laboratoire d’mes (LAAS-CNRS), Toulouse, France
关键词: Security;    IOMMU;    Firmware;    Linux;    Vulnerability;    Attack;   
DOI  :  10.1186/s13173-017-0066-7
学科分类:农业科学(综合)
来源: Springer U K
PDF
【 摘 要 】

Input/output (I/O) attacks have received increasing attention during the last decade. These attacks are performed by malicious peripherals that make read or write accesses to DRAM memory or to memory embedded in other peripherals, through DMA (Direct Memory Access) requests. Some protection mechanisms have been implemented in modern architectures to face these attacks. A typical example is the IOMMU (Input-Output Memory Management Unit). However, such mechanisms may not be properly configured and used by the firmware and the operating system. This paper describes a design weakness that we discovered in the configuration of an IOMMU and a possible exploitation scenario that would allow a malicious peripheral to bypass the underlying protection mechanism. The exploitation scenario is implemented for Intel architectures, with a PCI Express peripheral Field Programmable Gate Array, based on Intel specifications and Linux source code analysis. Finally, as a proof of concept, a Linux rootkit based on the attack presented in this paper is implemented.

【 授权许可】

CC BY   

【 预 览 】
附件列表
Files Size Format View
RO201902191930186ZK.pdf 810KB PDF download
  文献评价指标  
  下载次数:22次 浏览次数:28次