Skip to main content

Questions tagged [dma-attack]

DMA attack is an exploitation of a Direct Memory Access feature of ports like Firewire, Thunderbolt and PCI Express

0 votes
1 answer
105 views

Consider this: There is a DMA device in PC A (like a PCIe card) which exfiltrates data through USB to computer B. Can computer A also start hacking PC B through the same connection and e.g. exfiltrate ...
wowmuchinfoverysec's user avatar
2 votes
0 answers
95 views

This is a follow-up question to: How to check if a PCI device is trusted or untrusted by the Linux kernel (for IOMMU)? On Linux, is there a way to determine, from the command line, as root if ...
laomaiweng's user avatar
1 vote
0 answers
295 views

I am looking into how DMA works at the device driver and kernel level in the Linux kernel. I observed that access control to DMA buffers from IO devices is performed by the IOMMU and IOMMU driver in ...
sammy17's user avatar
  • 41
3 votes
1 answer
391 views

I am looking into the protection provided by IOMMU against DMA attacks. I noticed that the Linux kernel provides a feature called bounce buffers for untrusted PCI devices (https://lwn.net/Articles/...
sammy17's user avatar
  • 41
0 votes
0 answers
334 views

After reading libreboot FAQ i have some questions about USB 2.0 bus. There it is strongly recommended to use usb devices - USB network card and USB to SATA adapter (to connect HDD or SSD with it). The ...
ValoWaking's user avatar
1 vote
0 answers
252 views

I want to move data from an insecure host to a secure host, e.g. to update the software on a Ballot marking device, or move data back and forth between such hosts. But as we know, even common thumb ...
nealmcb's user avatar
  • 21k
0 votes
0 answers
161 views

Are there any non-obvious mitigations for the big DMA-attack revealed last year and demonstrated in this video by F-Secure? We know that Microsoft has published some material pertaining to DMA-...
Daniel's user avatar
  • 151
5 votes
1 answer
6k views

I'm attempting to ensure maximum security for my PC. I'm running Windows 10 Pro on a business-class HP notebook. Unless I'm mistaken, I understand that both a BIOS password and the BitLocker pre-boot ...
Daniel's user avatar
  • 151
2 votes
1 answer
954 views

I've just read about this: https://www.tripwire.com/state-of-security/security-data-protection/backdoors-hardware-attacks-rakshasa-malware/ Asides from the question in the title, I'd also like to add ...
Resonce's user avatar
  • 78
2 votes
1 answer
233 views

I want to discuss the following scenario: I use a cloud provider like Amazon where every instance of the OS is a VM. The hypervisor launches the VMs as needed. So let's assume there are two VMs ...
SFlow's user avatar
  • 283
4 votes
1 answer
574 views

I mean if it possible to safely plug a PCMCIA card into a PC without IOMMU? Such computers are very widespread, every digital TV or receiver has a CI+ slot, which is PCMCIA, and people insert there ...
KOLANICH's user avatar
  • 920
1 vote
0 answers
184 views

Following from: here, Let's say you have a server at a data centre, but a hacker manages to find a way in and has access to your server. What are the attack possibilities regarding Direct Memory ...
Kevin C's user avatar
  • 181
30 votes
1 answer
7k views

If you're already familiar with PCI behavior and Linux's handling of DMA buffers, skip to the third section for my actual question. Otherwise read on for a small summary of how PCI devices perform ...
forest's user avatar
  • 67.8k
6 votes
1 answer
2k views

what does IOMMU actually do, does it manage memory access for devices like MMU does for processes or is it more simplified thing and doesn't provide virtualization/access control ? So basically my ...
sec's user avatar
  • 65
1 vote
2 answers
313 views

And of course, any other possible attack that involves convincing the target to plug in a modified thunderbolt device into their MacBook I know that Thunderstrike works on MacBooks with firmware ...
genealogyxie's user avatar

15 30 50 per page