IOMMU protection against I/O attacks: a vulnerability and a proof of concept

9Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.

Abstract

Input/output (I/O) attacks have received increasing attention during the last decade. These attacks are performed by malicious peripherals that make read or write accesses to DRAM memory or to memory embedded in other peripherals, through DMA (Direct Memory Access) requests. Some protection mechanisms have been implemented in modern architectures to face these attacks. A typical example is the IOMMU (Input-Output Memory Management Unit). However, such mechanisms may not be properly configured and used by the firmware and the operating system. This paper describes a design weakness that we discovered in the configuration of an IOMMU and a possible exploitation scenario that would allow a malicious peripheral to bypass the underlying protection mechanism. The exploitation scenario is implemented for Intel architectures, with a PCI Express peripheral Field Programmable Gate Array, based on Intel specifications and Linux source code analysis. Finally, as a proof of concept, a Linux rootkit based on the attack presented in this paper is implemented.

Cite

CITATION STYLE

APA

Morgan, B., Alata, É., Nicomette, V., & Kaâniche, M. (2018). IOMMU protection against I/O attacks: a vulnerability and a proof of concept. Journal of the Brazilian Computer Society, 24(1). https://doi.org/10.1186/s13173-017-0066-7

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free