Corpus ID: 9744689

Understanding DMA

@inproceedings{Stewin2012UnderstandingD,
  title={Understanding DMA},
  author={Patrick Stewin and I. Bystrov},
  year={2012}
}
Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have direct memory access (DMA) to the host runtime memory. In this work we introduce DMA malware, i. e., malware executed on dedicated hardware to launch… Expand

Figures from this paper

References

SHOWING 1-10 OF 26 REFERENCES
Exploiting an I/OMMU vulnerability
SMM rootkits: a new breed of OS independent malware
VIPER: verifying the integrity of PERipherals' firmware
What If You Can't Trust Your Network Card?
SubVirt: implementing malware with virtual machines
Attacking Intel TXT via SINIT code execution hijacking
A Virtual Machine Introspection Based Architecture for Intrusion Detection
Copilot - a Coprocessor-based Kernel Runtime Integrity Monitor
...
1
2
3
...