11 research outputs found

    Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals

    Get PDF
    Direct Memory Access (DMA) attacks have been known for many years: DMA-enabled I/O peripherals have complete access to the state of a computer and can fully compromise it including reading and writing all of system memory. With the popularity of Thunderbolt 3 over USB Type-C and smart internal devices, opportunities for these attacks to be performed casually with only seconds of physical access to a computer have greatly broadened. In response, commodity hardware and operating-system (OS) vendors have incorporated support for Input-Output Memory Management Units (IOMMUs), which impose memory protection on DMA, and are widely believed to protect against DMA attacks. We investigate the state-of-the-art in IOMMU protection across OSes using a novel I/O security research platform, and find that current protections fall short when faced with a functional network peripheral that uses its complex interactions with the OS for ill intent, and demonstrate compromises against macOS, FreeBSD, and Linux, which notionally utilize IOMMUs to protect against DMA attackers. Windows only uses the IOMMU in limited cases and remains vulnerable. Using Thunderclap, an open-source FPGA research platform we built, we explore a number of novel exploit techniques to expose new classes of OS vulnerability. The complex vulnerability space for IOMMU-exposed shared memory available to DMA-enabled peripherals allows attackers to extract private data (sniffing cleartext VPN traffic) and hijack kernel control flow (launching a root shell) in seconds using devices such as USB-C projectors or power adapters. We have worked closely with OS vendors to remedy these vulnerability classes, and they have now shipped substantial feature improvements and mitigations as a result of our work.DARPA I2O FA8750-10-C-0237 ("CTSRD") DARPA MTO HR0011- 18-C-0016 ("ECATS") Arm Ltd Google Inc This work was also supported by EPSRC EP/R012458/1 (“IOSEC”)

    Inhibition of renin-angiotensin system (RAS) reduces ventricular tachycardia risk by altering connexin43

    No full text
    Renin-angiotensin system (RAS) activation is associated with arrhythmias. We investigated the effects of RAS inhibition in cardiac-specific angiotensin-converting enzyme (ACE) overexpression (ACE 8/8) mice, which exhibit proclivity to ventricular tachycardia (VT) and sudden death because of reduced connexin43 (Cx43). ACE 8/8 mice were treated with an ACE inhibitor (captopril) or an angiotensin receptor type-1 blocker (losartan). Subsequently, electrophysiological studies were performed, and the hearts were extracted for Cx43 quantification using immunoblotting, immunohistochemistry, fluorescent dye spread method, and sodium current quantification using whole cell patch clamping. VT was induced in 12.5% of captopril-treated ACE 8/8 and in 28.6% of losartan-treated mice compared to 87.5% of untreated mice (P<0.01). Losartan and captopril treatment increased total Cx43 2.4-fold (P=0.01) and the Cx43 phosphorylation ratio 2.3-fold (P=0.005). Treatment was associated with a recovery of gap junctional conductance. Survival in treated mice improved to 0.78 at 10 weeks (95% confidence interval 0.64 to 0.92), compared to the expected survival of less than 0.50. In a model of RAS activation, arrhythmic risk was correlated with reduced Cx43 amount and phosphorylation. RAS inhibition resulted in increased total and phosphorylated Cx43, decreased VT inducibility, and improved survival

    Pediatric Anesthesia Techniques

    No full text

    Sedation for the Pediatric Patient: A Review

    No full text
    corecore