- DMA attack
-
In cryptography, a DMA attack is a type of side channel attack whereby cryptographic keys can be stolen by an attacker who has physical access to an operating system.
Contents
Description
In modern operating systems, applications are obfuscated from the underlying physical memory, instead using virtual memory for their operations. In addition to allowing more efficient use of limited physical memory resources, this architecture forms an integral part of the security of an operating system.
The OHCI 1394 specification allows for devices for performance reasons to bypass the operating system and access physical memory directly without any security restrictions.[1][2] SBP2 devices can be spoofed, allowing an operating system to be tricked into allowing an attacker to both read and write physical memory.[3]
In addition to the nefarious uses mentioned above, there are some beneficial uses too as the DMA features can be used for kernel debugging purposes.[4]
Systems may be vulnerable to a DMA attack by an external device if they have a FireWire port, or if they have a PCMCIA or ExpressCard port that allows an expansion card with a FireWire port to be installed where the operating system supports plug and play. Systems with a Thunderbolt port may also be vulnerable.[citation needed][5]
IOMMU and VT-d can be used to secure device and allow it using only part of memory and use virtual memory. It was developed mainly for using in virtualization, but can be also used from preventing DMA attack and other device malfunctions. This technique however isn't used in any systems for preventing DMA attack.
See also
References
- ^ Freddie Witherden (2010-09-07). Memory Forensics Over the IEEE 1394 Interface. https://freddie.witherden.org/pages/ieee-1394-forensics.pdf. Retrieved 2011-04-02.
- ^ Piegdon, David Rasmus (2006-02-21). "Hacking in Physically Addressable Memory - A Proof of Concept". Seminar of Advanced Exploitation Techniques, WS 2006/2007. http://eh2008.koeln.ccc.de/fahrplan/attachments/1068_SEAT1394-svn-r432-slides.pdf.
- ^ "Blocking the SBP-2 Driver to Reduce 1394 DMA Threats to BitLocker". Microsoft. 2011-03-04. http://support.microsoft.com/kb/2516445. Retrieved 2011-03-15.
- ^ Tom Green. "1394 Kernel Debugging: Tips And Tricks". Microsoft. http://download.microsoft.com/download/1/8/f/18f8cee2-0b64-41f2-893d-a6f2295b40c8/dw04001_winhec2004.ppt. Retrieved 2011-04-02.
- ^ http://erratasec.blogspot.com/2011/02/thunderbolt-introducing-new-way-to-hack.html
External links
Categories:- Cryptography stubs
- Cryptographic attacks
Wikimedia Foundation. 2010.