A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory

@inproceedings{Stewin2013APF,
  title={A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory},
  author={Patrick Stewin},
  booktitle={RAID},
  year={2013}
}
Computer platform peripherals such as network and management controller can be used to attack the host computer via direct memory access (DMA). DMA-based attacks launched from peripherals are capable of compromising the host without exploiting vulnerabilities present in the operating system running on the host. Therefore they present a highly critical threat to system security and integrity. Unfortunately, to date no OS implements security mechanisms that can detect DMA-based attacks… CONTINUE READING
Highly Cited
This paper has 20 citations. REVIEW CITATIONS
13 Citations
38 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-10 of 38 references

Taming ROP on Sandy Bridge

  • Georg Wicherski
  • SyScan: http://www.syscan. org/index.php/download…
  • 2013
1 Excerpt

Integrating DMA attacks in Metasploit

  • R. Breuk, A. Spruyt
  • Sebug: http: //sebug.net/paper/Meeting-Documents…
  • 2012
1 Excerpt

Issues in Software-based Attestation

  • Q. Nguyen
  • Kaspersky Lab: http://www. kaspersky.com/images…
  • 2012
1 Excerpt

Windows Internals 6th Edition, Part 2

  • M. E. Russinovich, D. A. Solomon, A. Ionescu
  • Microsoft Press,
  • 2012

Similar Papers

Loading similar papers…