2013
DOI: 10.1007/978-3-642-41284-4_1
|View full text |Cite
|
Sign up to set email alerts
|

A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform’s Main Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 16 publications
0
15
0
Order By: Relevance
“…Although the main goal of this attack is to circumvent Intel TXT, we can learn that VT-d is easy to misconfigure and then an attacker can launch a DMA attack. Moreover, Stewin [10] explains several reasons that we cannot trust IOMMU as a countermeasure against DMA attacks. However, IOCheck is a generic framework that can check IOMMU configurations and provide further protection for I/O devices.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Although the main goal of this attack is to circumvent Intel TXT, we can learn that VT-d is easy to misconfigure and then an attacker can launch a DMA attack. Moreover, Stewin [10] explains several reasons that we cannot trust IOMMU as a countermeasure against DMA attacks. However, IOCheck is a generic framework that can check IOMMU configurations and provide further protection for I/O devices.…”
Section: Related Workmentioning
confidence: 99%
“…BARM [10] aims to detect and prevent DMA-based attacks. It is based on modeling the expected memory bus activity and comparing it to the actual activity.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The core entity used for facilitating virtualization in cloud computing infrastructures is the hypervisor (also referred to as the VMM, Virtual Machine Monitor) as in [2,4,6,7,27,22,3,16,17,18,19,21]. Being a basic part in the virtualization infrastructure, the hypervisor is the most attractive target for attackers.…”
Section: Introductionmentioning
confidence: 99%
“…al. [209] demonstrated that all of these DMA-based approaches will reveal some artifacts that are exposed in the CPU performance counters. Similar techniques could be employed by malware authors in both physical and virtual environments to detect the presence of a polling-based memory acquisition system such as ours.…”
Section: Addressing Memory Bandwidth Artifactsmentioning
confidence: 99%