From Collaborative RCE Knowledge Library

Jump to: navigation, search

Windows Reversing Technique Articles

Item name: Subverting Windows7 x64 kernel with DMA attacks
Rating: 0.0 (0 votes)
Author: Christophe Devine, Damien Aumaitre                        
Home URL:
Last updated: July 4, 2010
Version (if appl.):
Direct D/L link:
Description: This presentation will focus on concrete examples of compromising the Windows 7 x64 operating system, in effect bypassing two major security mecanisms: code signing and integrity verification (PatchGuard).

First, we’ll explain the internal structures of the operating system, and how they differ from previous versions. Then we describe how to alter these structures in order to gain control over the execution flow. The implementation of this attack is then presented, using an embedded soft-core MIPS CPU implemented on an FPGA PCMCIA/CardBus card.

Finally, we will conclude on the importance of new protection features included in recent CPUs, in particular the IOMMU and TXT.
Also listed in: Windows Internals Articles
More details: Click here for more details, images, related URLs & comments for this item! (or to update its entry)

RSS feed Feed containing all updates and additions for this category.

RSS feed Feed containing all updates and additions for this category, including sub-categories.

Category Navigation Tree