Understanding DMA Malware

Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have Direct Memory Access (DMA) to the host runtime memory. In this paper, the authors introduce DMA malware, i.e., malware executed on dedicated hardware to launch stealthy attacks against the host using DMA.

Provided by: Ruhr-Universitat Bochum Topic: Security Date Added: Apr 2012 Format: PDF

Download Now

Find By Topic