Skip to Main content Skip to Navigation
New interface
Conference papers

Hardware Based Security Enhanced Direct Memory Access

Abstract : This paper presents an approach to prevent memory attacks enabled by DMA. DMA is a technique that is frequently used to release processors from simple memory transfers. DMA transfers are usually performed during idle times of the bus. A disadvantage of DMA transfers is that they are primarily unsupervised by anti malware agents. After the completion of a DMA activity the transfered data can be scanned for malicious codes. At this time the malicious structures are already in the memory and processor time is necessary to perform a malware scan. The approach presented in this paper enhances the DMA by a watchdog mechanisms that scans the data passing by and interrupts the processor after the detection of a malicious data or instruction sequence. Configurable hardware based on FPGAs is used to overcome the problem of frequently changing malware and malware signatures.
Complete list of metadata
Contributor : Hal Ifip Connect in order to contact the contributor
Submitted on : Monday, March 20, 2017 - 3:51:19 PM
Last modification on : Monday, March 20, 2017 - 3:55:41 PM
Long-term archiving on: : Wednesday, June 21, 2017 - 1:41:28 PM


Files produced by the author(s)


Distributed under a Creative Commons Attribution 4.0 International License



Marcel Eckert, Igor Podebrad, Bernd Klauer. Hardware Based Security Enhanced Direct Memory Access. 14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.145-151, ⟨10.1007/978-3-642-40779-6_12⟩. ⟨hal-01492816⟩



Record views


Files downloads