Hardware Based Security Enhanced Direct Memory Access - Communications and Multimedia Security Access content directly
Conference Papers Year : 2013

Hardware Based Security Enhanced Direct Memory Access

Abstract

This paper presents an approach to prevent memory attacks enabled by DMA. DMA is a technique that is frequently used to release processors from simple memory transfers. DMA transfers are usually performed during idle times of the bus. A disadvantage of DMA transfers is that they are primarily unsupervised by anti malware agents. After the completion of a DMA activity the transfered data can be scanned for malicious codes. At this time the malicious structures are already in the memory and processor time is necessary to perform a malware scan. The approach presented in this paper enhances the DMA by a watchdog mechanisms that scans the data passing by and interrupts the processor after the detection of a malicious data or instruction sequence. Configurable hardware based on FPGAs is used to overcome the problem of frequently changing malware and malware signatures.
Fichier principal
Vignette du fichier
978-3-642-40779-6_12_Chapter.pdf (191.47 Ko) Télécharger le fichier
Origin Files produced by the author(s)

Dates and versions

hal-01492816 , version 1 (20-03-2017)

Licence

Identifiers

Cite

Marcel Eckert, Igor Podebrad, Bernd Klauer. Hardware Based Security Enhanced Direct Memory Access. 14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.145-151, ⟨10.1007/978-3-642-40779-6_12⟩. ⟨hal-01492816⟩
310 View
427 Download

Altmetric

Share

Gmail Mastodon Facebook X LinkedIn More