DMA Security in the Presence of IOMMUs
dc.contributor.author | Schwarz, Christian | |
dc.contributor.author | Reusch, Viktor | |
dc.contributor.author | Planeta, Maksym | |
dc.date.accessioned | 2022-03-08T09:59:33Z | |
dc.date.available | 2022-03-08T09:59:33Z | |
dc.date.issued | 2022 | |
dc.description.abstract | Faulty, vulnerable or malicious PCIe devices can harm a system through DMA. IOMMUs can act as a security mechanism to protect against this problem by restricting the memory that is accessible via DMA. Unfortunately, there are methods to bypass the IOMMU restrictions. This paper is a survey over the currently existing bypasses and their feasibility. Current systems might be exploited from any untrusted source of DMA, which includes peripheral PCIe devices, virtual machines using SR-IOV, and even RDMA network cards, which enable remote attacks. Key strategies for the attacks presented here are Rowhammer, cache side-channels, and the exploitation of weaknesses in device drivers, e.g., for network cards, or protocols like PCIe or Ethernet OAM. An attacker can potentially achieve denial of service, the reading of confidential data, and even arbitrary code execution. Fortunately, there are some precautions to reduce the risks for affected systems. | en |
dc.identifier.doi | 10.18420/fgbs2022f-04 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/38507 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | Tagungsband des FG-BS Frühjahrstreffens 2022 | |
dc.subject | IOMMU | |
dc.subject | DMA | |
dc.subject | PCIe | |
dc.subject | SR-IOV | |
dc.subject | RDMA | |
dc.subject | Thunderbolt | |
dc.subject | Rowhammer | |
dc.title | DMA Security in the Presence of IOMMUs | en |
dc.type | Text | |
gi.citation.publisherPlace | Bonn | |
gi.conference.date | 17.-18. März 2022 | |
gi.conference.location | Hamburg, Deutschland | |
gi.document.quality | digidoc |
Dateien
Originalbündel
1 - 1 von 1