Integrating DMA attacks in exploitation frameworks
Rory Breuk Albert Spruyt
University of Amsterdam
February 7, 2012
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 1 / 15
Integrating DMA attacks in exploitation frameworks Rory Breuk - - PowerPoint PPT Presentation
Integrating DMA attacks in exploitation frameworks Rory Breuk Albert Spruyt University of Amsterdam February 7, 2012 Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 1 / 15 Introduction Research Question: How can
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 1 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 2 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 3 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 4 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 5 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 6 / 15
IEEE1394 Internet Local attacker Target Remote attacker
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 7 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 8 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 9 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 10 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 11 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 12 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 13 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 14 / 15
Rory Breuk, Albert Spruyt (UvA) Integrating DMA attacks February 7, 2012 15 / 15