메뉴 건너뛰기




Volumn , Issue , 2015, Pages

Run-DMA

Author keywords

[No Author keywords available]

Indexed keywords

COMMODITY HARDWARE; DIRECT MEMORY ACCESS; MAIN MEMORY; MALICIOUS BEHAVIOR; PROOF OF CONCEPT;

EID: 85084164551     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (48)
  • 1
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • August Online
    • Aleph One. Smashing the stack for fun and profit. Phrack Magazine, 49(14), August 1996. Online: http://www.phrack.org/issues.html?issue=49&id=14.
    • (1996) Phrack Magazine , vol.49 , Issue.14
    • One, A.1
  • 2
    • 85077796489 scopus 로고    scopus 로고
    • ARM, July Online
    • CoreLinkTM DMA Controller DMA-330. ARM, July 2010. Online: http://infocenter.arm.com/help/topic/com.arm.doc. ddi0424c/DDI0424C_dma330_r1p1_trm. pdf.
    • (2010) CoreLinkTM DMA Controller DMA-330
  • 3
    • 0001402143 scopus 로고
    • The object-oriented database system manifesto
    • Won Kim, Jean-Marie Nicolas, and Shojiro Nishio, editors, Elsevier, December Online
    • Malcolm Atkinson, Franǫis Bancilhon, David DeWitt, Klaus Dittrich, David Maier, and Stanley Zdonik. The object-oriented database system manifesto. In Won Kim, Jean-Marie Nicolas, and Shojiro Nishio, editors, Proceedings of DOOD 1989, pages 223–40. Elsevier, December 1989. Online: https://www.cs.cmu.edu/~clamen/OODBMS/Manifesto/Manifesto.PS.gz.
    • (1989) Proceedings of DOOD 1989 , pp. 223-240
    • Atkinson, M.1    Bancilhon, F.2    DeWitt, D.3    Dittrich, K.4    Maier, D.5    Zdonik, S.6
  • 4
    • 85084162701 scopus 로고    scopus 로고
    • Page-fault weird machine: Lessons in instruction-less computation
    • USENIX, August Online
    • Julian Bangert, Sergey Bratus, Rebecca Shapiro, and Sean W. Smith. Page-fault weird machine: Lessons in instruction-less computation. In Proceedings of WOOT 2013. USENIX, August 2013. Online: https://www.usenix. org/conference/woot13/workshopprogram/presentation/Bangert.
    • (2013) Proceedings of WOOT 2013
    • Bangert, J.1    Bratus, S.2    Shapiro, R.3    Smith, S.W.4
  • 5
    • 34447541281 scopus 로고    scopus 로고
    • Firewire: All your memory are belong to us
    • May Online
    • Michael Becher, Maximillian Dornseif, and Christian N. Klein. FireWire: all your memory are belong to us. Presented at CanSecWest 2005, May 2005. Online: https://cansecwest.com/core05/2005-firewire-cansecwest.pdf.
    • (2005) CanSecWest 2005
    • Becher, M.1    Dornseif, M.2    Klein, C.N.3
  • 7
    • 62649168081 scopus 로고
    • On a family of turing machines and the related programming language
    • July
    • Corrado Böhm. On a family of Turing machines and the related programming language. International Computation Centre Bulletin, 3:187–94, July 1964.
    • (1964) International Computation Centre Bulletin , vol.3 , pp. 187-194
    • Böhm, C.1
  • 8
    • 84897710145 scopus 로고
    • Flow diagrams, turing machines and languages with only two formation rules
    • May
    • Corrado Böhm and Giuseppe Jacopini. Flow diagrams, Turing machines and languages with only two formation rules. Communications of the ACM, 9(5):366–71, May 1966.
    • (1966) Communications of the ACM , vol.9 , Issue.5 , pp. 366-371
    • Böhm, C.1    Jacopini, G.2
  • 10
    • 84898417979 scopus 로고    scopus 로고
    • Beyond planted bugs in “trusting trust”: The input-processing frontier
    • January
    • Sergey Bratus, Trey Darley, Michael Locasto, Meredith L. Patterson, Rebecca Shapiro, and Anna Shubina. Beyond planted bugs in “trusting trust”: The input-processing frontier. Security Privacy, IEEE, 12(1):83–87, January 2014.
    • (2014) Security Privacy, IEEE , vol.12 , Issue.1 , pp. 83-87
    • Bratus, S.1    Darley, T.2    Locasto, M.3    Patterson, M.L.4    Shapiro, R.5    Shubina, A.6
  • 11
    • 84971276679 scopus 로고    scopus 로고
    • Broadcom Corporation, February Online
    • BCM2835 ARM Peripherals. Broadcom Corporation, February 2012. Online: https://www.raspberrypi.org/wpcontent/uploads/2012/02/BCM2835-ARM-Peripherals.pdf.
    • (2012) BCM2835 ARM Peripherals
  • 12
    • 84938984232 scopus 로고    scopus 로고
    • Iseeyou: Disabling the MacBook web-cam indicator LED
    • USENIX Association, August Online
    • Matthew Brocker and Stephen Checkoway. iSeeYou: Disabling the MacBook web-cam indicator LED. In Proceedings of USENIX Security 2014), pages 337–52. USENIX Association, August 2014. Online: https://www.usenix.org/conference/usenixsecurity14/technicalsessions/presentation/brocker.
    • (2014) Proceedings of USENIX Security 2014) , pp. 337-352
    • Brocker, M.1    Checkoway, S.2
  • 13
    • 70349267779 scopus 로고    scopus 로고
    • When good instructions go bad: Generalizing return-oriented programming to RISC
    • Paul Syverson and Somesh Jha, editors, ACM Press, October
    • Erik Buchanan, Ryan Roemer, Hovav Shacham, and Stefan Savage. When good instructions go bad: Generalizing return-oriented programming to RISC. In Paul Syverson and Somesh Jha, editors, Proceedings of CCS 2008, pages 27–38. ACM Press, October 2008.
    • (2008) Proceedings of CCS 2008 , pp. 27-38
    • Buchanan, E.1    Roemer, R.2    Shacham, H.3    Savage, S.4
  • 14
    • 84861443711 scopus 로고    scopus 로고
    • Can DREs provide long-lasting security? The case of return-oriented programming and the AVC advantage
    • David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, USENIX/ACCURATE/IAVoSS, August
    • Stephen Checkoway, Ariel J. Feldman, Brian Kantor, J. Alex Halderman, Edward W. Felten, and Hovav Shacham. Can DREs provide long-lasting security? The case of return-oriented programming and the AVC Advantage. In David Jefferson, Joseph Lorenzo Hall, and Tal Moran, editors, Proceedings of EVT/WOTE 2009. USENIX/ACCURATE/IAVoSS, August 2009.
    • (2009) Proceedings of EVT/WOTE 2009
    • Checkoway, S.1    Feldman, A.J.2    Kantor, B.3    Alex Halderman, J.4    Felten, E.W.5    Shacham, H.6
  • 15
    • 78650032454 scopus 로고    scopus 로고
    • Return-oriented programming without returns
    • Angelos Keromytis and Vitaly Shmatikov, editors, ACM Press, October Online
    • Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. Return-oriented programming without returns. In Angelos Keromytis and Vitaly Shmatikov, editors, Proceedings of CCS 2010, pages 559–72. ACM Press, October 2010. Online: https://www.cs.jhu.edu/~s/papers/noret_ccs2010.html.
    • (2010) Proceedings of CCS 2010 , pp. 559-572
    • Checkoway, S.1    Davi, L.2    Dmitrienko, A.3    Sadeghi, A.-R.4    Shacham, H.5    Winandy, M.6
  • 16
    • 85019675961 scopus 로고    scopus 로고
    • July Online
    • Stephen Dolan. mov is Turing-complete. July 2013. Online: http://www.cl.cam.ac.uk/~sd601/papers/mov.pdf.
    • (2013) Mov Is Turing-Complete
    • Dolan, S.1
  • 17
    • 78651389795 scopus 로고    scopus 로고
    • Can you still trust your network card?
    • March Online
    • Loïc Duflot and Yves-Alexis Perez. Can you still trust your network card? Presented at CanSecWest 2010, March 2010. Online: http://www.ssi.gouv.fr/IMG/pdf/cswtrustnetworkcard.pdf.
    • (2010) CanSecWest 2010
    • Duflot, L.1    Perez, Y.-A.2
  • 18
    • 84857292785 scopus 로고    scopus 로고
    • What if you can’t trust your network card?
    • Robin Sommer, Davide Balzarotti, and Gregor Maier, editors, Springer, September Online
    • Loïc Duflot, Yves-Alexis Perez, and Benjamin Morin. What if you can’t trust your network card? In Robin Sommer, Davide Balzarotti, and Gregor Maier, editors, Proceedings of RAID 2011, pages 378–397. Springer, September 2011. Online: http://www.ssi.gouv.fr/IMG/pdf/paper.pdf.
    • (2011) Proceedings of RAID 2011 , pp. 378-397
    • Duflot, L.1    Perez, Y.-A.2    Morin, B.3
  • 20
    • 70349278622 scopus 로고    scopus 로고
    • Code injection attacks on harvard-architecture devices
    • Paul Syverson and Somesh Jha, editors, ACM Press, October
    • Aurélien Francillon and Claude Castelluccia. Code injection attacks on Harvard-architecture devices. In Paul Syverson and Somesh Jha, editors, Proceedings of CCS 2008, pages 15–26. ACM Press, October 2008.
    • (2008) Proceedings of CCS 2008 , pp. 15-26
    • Francillon, A.1    Castelluccia, C.2
  • 22
    • 6344291533 scopus 로고    scopus 로고
    • Turing machines, transition systems, and interaction
    • November Online
    • Dina Q. Goldin, Scott A. Smolka, Paul C. Attie, and Elaine L. Sonderegger. Turing machines, transition systems, and interaction. Information and Computation, 194(2): 101–28, November 2004. Online: http: //www.sciencedirect.com/science/ article/pii/S0890540104001257.
    • (2004) Information and Computation , vol.194 , Issue.2 , pp. 101-128
    • Goldin, D.Q.1    Smolka, S.A.2    Attie, P.C.3    Sonderegger, E.L.4
  • 23
    • 85029681162 scopus 로고    scopus 로고
    • Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms
    • Fabian Mon-rose, editor, USENIX, August
    • Ralf Hund, Thorsten Holz, and Felix Freiling. Return-oriented rootkits: Bypassing kernel code integrity protection mechanisms. In Fabian Mon-rose, editor, Proceedings of USENIX Security 2009, pages 383–98. USENIX, August 2009.
    • (2009) Proceedings of USENIX Security 2009 , pp. 383-398
    • Hund, R.1    Holz, T.2    Freiling, F.3
  • 24
    • 85077800250 scopus 로고    scopus 로고
    • July Online
    • Intel Platform Controller Hub EG20T: Datasheet. Intel, July 2012. Online: http://www.intel.com/content/www/us/en/intelligent-systems/queensbay/platform-controller-hub-eg20tdatasheet.html.
    • (2012) Intel Platform Controller Hub EG20T: Datasheet
  • 25
    • 84857343850 scopus 로고    scopus 로고
    • May Online
    • Intel Server Platform Group. Intel QuickData technology software guide for Linux, May 2008. Online: http://www.intel.com/content/dam/doc/white-paper/quickdatatechnology-software-guide-forlinux-paper.pdf.
    • (2008) Intel QuickData Technology Software Guide for Linux
  • 26
    • 85077790102 scopus 로고    scopus 로고
    • Thunderbolts and lightning, very very frightening
    • May Online
    • Loukas Kalenderidis and Sam Collinson. Thunderbolts and lightning, very very frightening. Presented at SyScan 2014, May 2014. Online: https://www.youtube.com/watch?v=0FoVmBOdbhg.
    • (2014) SyScan 2014
    • Kalenderidis, L.1    Collinson, S.2
  • 27
  • 29
    • 84914129819 scopus 로고    scopus 로고
    • You can type, but you can’t hide: A stealthy GPU-based keylogger
    • Thorsten Holz and Sotiris Ioannidis, editors, ACM, April Online
    • Evangelos Ladakis, Lazaros Koromilas, Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. You can type, but you can’t hide: A stealthy GPU-based keylogger. In Thorsten Holz and Sotiris Ioannidis, editors, Proceedings of EuroSec 2013. ACM, April 2013. Online: http://www.cs.columbia.edu/~mikepo/ papers/gpukeylogger.eurosec13.pdf.
    • (2013) Proceedings of EuroSec 2013
    • Ladakis, E.1    Koromilas, L.2    Vasiliadis, G.3    Polychronakis, M.4    Ioannidis, S.5
  • 30
    • 79956057382 scopus 로고    scopus 로고
    • Developments in cisco IOS forensics
    • November
    • Felix Lidner. Developments in Cisco IOS forensics. CONFidence 2.0. http://www.recuritylabs.com/content/pub/FX_Router_ Exploitation.pdf, November 2009.
    • (2009) CONFidence 2.0
    • Lidner, F.1
  • 31
    • 84910621255 scopus 로고    scopus 로고
    • Battery firmware hacking: Inside the innards of a smart battery
    • August Online
    • Charlie Miller. Battery firmware hacking: Inside the innards of a smart battery. Presented at Black Hat Briefings, August 2011. Online: http://media.blackhat.com/bh- us-11/Miller/BH_US_11_Miller_Battery_ Firmware_Public_WP.pdf.
    • (2011) Black Hat Briefings
    • Miller, C.1
  • 32
    • 84977072287 scopus 로고    scopus 로고
    • July Online
    • HD Moore. A penetration tester’s guide to IPMI and BMCs. July 2013. Online: https://community.rapid7.com/community/ metasploit/blog/2013/07/02/a-penetration-testers-guide-to-ipmi.
    • (2013) A Penetration Tester’s Guide to IPMI and BMCs
  • 33
    • 85084161804 scopus 로고    scopus 로고
    • Exploiting the hard-working DWARF: Trojan and exploit techniques with no native executable code
    • USENIX Association, August Online
    • James Oakley and Sergey Bratus. Exploiting the hard-working DWARF: Trojan and exploit techniques with no native executable code. In Proceedings WOOT 2011. USENIX Association, August 2011. Online: http://dl.acm.org/citation.cfm?id=2028052.2028063.
    • (2011) Proceedings WOOT 2011
    • Oakley, J.1    Bratus, S.2
  • 36
    • 84968558644 scopus 로고    scopus 로고
    • Q: Exploit hardening made easy
    • David Wagner, editor, August Online
    • Edward J. Schwartz, Thanassis Avgerinos, and David Brumley. Q: Exploit hardening made easy. In David Wagner, editor, Proceedings of USENIX Security 2011, August 2011. Online: http://users.ece.cmu.edu/~ejschwar/papers/usenix11.pdf.
    • (2011) Proceedings of USENIX Security 2011
    • Schwartz, E.J.1    Avgerinos, T.2    Brumley, D.3
  • 37
    • 77952351839 scopus 로고    scopus 로고
    • The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86)
    • Sabrina De Capitani di Vimercati and Paul Syverson, editors, ACM Press, October
    • Hovav Shacham. The geometry of innocent flesh on the bone: Return-into-libc without function calls (on the x86). In Sabrina De Capitani di Vimercati and Paul Syverson, editors, Proceedings of CCS 2007, pages 552–61. ACM Press, October 2007.
    • (2007) Proceedings of CCS 2007 , pp. 552-561
    • Shacham, H.1
  • 38
    • 85084161911 scopus 로고    scopus 로고
    • Weird machines” in ELF: A spotlight on the underappreciated metadata
    • USENIX, August Online
    • Rebecca Shapiro, Sergey Bratus, and Sean W. Smith. “Weird machines” in ELF: A spotlight on the underappreciated metadata. In Proceedings of WOOT 2013. USENIX, August 2013. Online: https://www.usenix.org/conference/woot13/workshopprogram/presentation/Shapiro.
    • (2013) Proceedings of WOOT 2013
    • Shapiro, R.1    Bratus, S.2    Smith, S.W.3
  • 39
    • 76949101487 scopus 로고    scopus 로고
    • Bugtraq, August Online
    • Solar Designer. Getting around non-executable stack (and fix). Bugtraq, August 1997. Online: http://seclists.org/bugtraq/1997/Aug/0063.html.
    • (1997) Getting around Non-Executable Stack (and Fix)
  • 41
    • 84888378420 scopus 로고    scopus 로고
    • A primitive for revealing stealthy peripheral-based attacks on the computing platform’s main memory
    • October Online
    • Patrick Stewin. A primitive for revealing stealthy peripheral-based attacks on the computing platform’s main memory. In Proceedings of RAID 2013, pages 1–20, October 2013. Online: http://link.springer.com/chapter/10.1007%2F978-3-642-41284-4_1.
    • (2013) Proceedings of RAID 2013 , pp. 1-20
    • Stewin, P.1
  • 42
    • 84875669566 scopus 로고    scopus 로고
    • Understanding dma malware
    • Springer-Verlag, July Online
    • Patrick Stewin and Iurii Bystrov. Understanding dma malware. In Proceedings of DIMVA 2012, pages 21–41. Springer-Verlag, July 2012. Online: http://dx.doi.org/10.1007/978-3-642-37300-8_2.
    • (2012) Proceedings of DIMVA 2012 , pp. 21-41
    • Stewin, P.1    Bystrov, I.2
  • 43
    • 84855347648 scopus 로고    scopus 로고
    • Introducing ring −3 rootkits
    • July Online
    • Alexander Tereshkin and Rafal Wojtczuk. Introducing ring −3 rootkits. Presented at Black Hat Briefings, July 2009. Online: http://www.blackhat.com/presentations/bh-usa-09/TERESHKIN/BHUSA09-Tereshkin-Ring3Rootkit-SLIDES.pdf.
    • (2009) Black Hat Briefings
    • Tereshkin, A.1    Wojtczuk, R.2
  • 44
    • 84875683728 scopus 로고    scopus 로고
    • November Online
    • Arrigo Triulzi. Project Maux Mk.II, November 2008. Online: http://www.alchemistowl.org/arrigo/Papers/Arrigo-TriulziPACSEC08-Project-Maux-II.pdf.
    • (2008) Project Maux Mk.II
    • Triulzi, A.1
  • 47
    • 84939556806 scopus 로고    scopus 로고
    • The weird machines in proof-carrying code
    • IEEE Computer Society, May Online
    • Julien Vanegue. The weird machines in proof-carrying code. In Proceedings of SPW 2014, pages 209–13. IEEE Computer Society, May 2014. Online: http://www.ieee-security.org/TC/SPW2014/papers/5103a209.PDF.
    • (2014) Proceedings of SPW 2014 , pp. 209-213
    • Vanegue, J.1
  • 48
    • 78651410940 scopus 로고    scopus 로고
    • GPU-assisted malware
    • Jean-Yves Marion, Noam Rathaus, and Cliff Zhou, editors, IEEE Computer Society, October Online
    • Giorgos Vasiliadis, Michalis Polychronakis, and Sotiris Ioannidis. GPU-assisted malware. In Jean-Yves Marion, Noam Rathaus, and Cliff Zhou, editors, Proceedings of MAL-WARE 2010, pages 1–6. IEEE Computer Society, October 2010. Online: http://dcs.ics.forth.gr/Activities/ papers/gpumalware.malware10.pdf.
    • (2010) Proceedings of MAL-WARE 2010 , pp. 1-6
    • Vasiliadis, G.1    Polychronakis, M.2    Ioannidis, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.