|COOKIES: By using this website you agree that we can place Google Analytics Cookies on your device for performance monitoring.|
GPU-mediated direct-memory-access attacks in a smart phone
If you have a question about this talk, please contact Markus Kuhn.
Most modern smart phones are equipped with a Graphics Processing Unit (GPU), which takes care of rendering graphics, taking the workload off the CPU . For efficiency reasons, GPUs get Direct Memory Access (DMA), so that they can access any part of both kernel and user space memory. DMA attacks via FireWire and other PCI devices are well known and publicised. In this talk, I present a DMA attack using the GPU . The theoretical model holds for any device with GPU . Errors in the driver implementation of the Mali GPU on Samsung Galaxy SII phones allowed me to create a proof-of-concept exploit, which I will describe. I start off by describing the GPU programming model and processing pipeline, followed by an analysis of Mali Memory Management, and the flaws that enabled me to perform the DMA attack on Samsung Galaxy SII phones. I will explain different approaches for creating an exploit.
This talk is part of the Computer Laboratory Security Group meeting presentations series.
This talk is included in these lists:
Note that ex-directory lists are not shown.
Other listsRepresentational Similarity Analysis Type the title of a new list here Cambridge eScience Centre
Other talksComputational Neuroscience Journal Club Do changes in Subjective Probability Distributions reflect a Prediction Error driven learning process? How does recent linguistic experience result in a retuning of lexical-semantic representations? Switching to the dark side: Repositioning of Polyglutamine Repeat Promotes Amyloid Fibril Formation by the Model Protein, β-Lactamase BlaP The Southern Ocean in climate models Dirty words a historyof swearing and abuse in Tamil