Taking DMA Attacks to the Next Level
Offered By: Black Hat via YouTube
Course Description
Overview
Explore a groundbreaking physical DMA attack that exploits vulnerabilities in standard DIMM slot hardware design. Learn about an undetectable method that doesn't require a specific port, using a custom PCB probe with an FPGA to connect to exposed DDR4 pins on off-the-shelf desktop systems. Discover how attackers can masquerade as benign memory controllers to read or modify memory at any physical address while the system is in S3 sleep state. Gain insights into this novel technique presented by Anna Trikalinou and Dan Lake, which allows arbitrary memory manipulation in live, unmodified systems using a rogue memory controller.
Syllabus
Taking DMA Attacks to the Next Level
Taught by
Black Hat
Related Courses
Between Physical and Sofware: Fault Attacks, Side Channels, and MitigationsGraz University of Technology via edX POSWorld - Should You Be Afraid of Hands-On Payment Devices
Black Hat via YouTube Drammer - The Making Of
Hack In The Box Security Conference via YouTube The Evolving Attack Surface
Kaspersky via YouTube Blacksmith- Compromising Target Row Refresh by Rowhammering in the Frequency Domain
IEEE via YouTube