Главная
Study mode:
on
1
Intro
2
Welcome
3
Presentation
4
Roadmap
5
Disclaimer
6
IO MMU
7
Peripheral Domains
8
Hypervisor
9
What is DMA
10
VBS
11
Linux IOMMU
12
Intel IOMMU
13
Apple IOMMU
14
Custom UEFI protocol
15
IO mapping class
16
IOMU workflow
17
Password checking patch
18
Prerequisites
19
FPGA example
20
Mac OS
21
Network packets
22
MX
23
MX flag set
24
DMA access
25
Apple patch
26
Conclusion
27
DMA projects
28
Thunderbolt on Windows
29
First schematic
30
Questions
Description:
Explore the intricacies of Direct Memory Access (DMA) attacks and Input Output Memory Management Unit (IOMMU) in this 34-minute conference talk from NorthSec 2020. Delve into the security implications of DMA technology, which allows peripherals to access RAM without CPU involvement. Gain insights into IOMMU functioning and its integration within Windows, macOS, and Linux operating systems. Examine existing DMA attacks using external peripherals on active computers, with a focus on IOMMU bypassing techniques on macOS up to version 10.12.4. Learn how these attacks can provide access to valid logon sessions even when the computer is locked. Discover the speaker's background in penetration testing and reverse engineering, and get a glimpse into the French RAPID project, DMArvest. Follow the comprehensive roadmap covering topics such as peripheral domains, hypervisors, VBS, Intel IOMMU, Apple IOMMU, custom UEFI protocols, and practical examples using FPGA and Thunderbolt on Windows.

IOMMU and DMA Attacks

NorthSec
Add to list
0:00 / 0:00