A DMA attack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence of high-speed expansion ports that permit direct memory access (DMA).
DMA is included in a number of connections, because it lets a connected device (such as a camcorder, network card, storage device or other useful accessory or internal PC card) transfer data between itself and the computer at the maximum speed possible, by using direct hardware access to read or write directly to main memory without any operating system supervision or interaction. The legitimate uses of such devices have led to wide adoption of DMA accessories and connections, but an attacker can equally use the same facility to create an accessory that will connect using the same port, and can then potentially gain direct access to part or all of the physical memory address space of the computer, bypassing all OS security mechanisms and any lock screen, to read all that the computer is doing, steal data or cryptographic keys, install or run spyware and other exploits, or modify the system to allow backdoors or other malware.
Preventing physical connections to such ports will prevent DMA attacks. On many computers, the connections implementing DMA can also be disabled within the BIOS or UEFI if unused, which depending on the device can nullify or reduce the potential for this type of exploit.
Examples of connections that may allow DMA in some exploitable form include FireWire, CardBus, ExpressCard, Thunderbolt, USB 4.0, PCI, PCI-X, and PCI Express.
A DMAattack is a type of side channel attack in computer security, in which an attacker can penetrate a computer or other device, by exploiting the presence...
Direct memory access (DMA) is a feature of computer systems that allows certain hardware subsystems to access main system memory independently of the...
steal the now-accessible data. Another method of attack is through a DMAattack in which an attacker accesses the victim's information through hardware...
a DMAattack. While the focus of current research is on disk encryption, any sensitive data held in memory is vulnerable to the attack. Attackers execute...
Rockstar Games UK Limited (formerly DMA Design Limited and Rockstar North Limited) is a British video game development company and a studio of Rockstar...
November 2023. "What Is a DMAAttack? Analysis & Mitigation". Kroll. Retrieved 4 December 2023. "What Are Eavesdropping Attacks?". Fortinet. Retrieved 5...
such as direct memory access (DMA), which in turn have created opportunities for security exploits such as the DMAattack. The chipset and drivers used...
firescope and fireproxy exist. DMAattack HAVi Linux IEEE 1394 target List of interface bit rates Pin control attack "1394ta.org". 1394ta.org. Archived...
and ExpressCard are vulnerable to DMAattack unless the laptop has an IOMMU that is configured to thwart these attacks. One notable exception to the above...
malicious firmware is used to clone device identities which makes classical DMAattack possible. The Thunderspy security vulnerabilities were first publicly...
commands, data, and status between Serial Bus peripherals. IEEE 1394 DMAattack USB Serial Bus Protocol 2 (SBP-2) Draft, revision 4 An overview[permanent...
about extra security flaws compared to what's already possible with a DMAattack even if the firmware was already stored within the device at all times...
feature called "Kernel Direct Memory access (DMA) Protection" to BitLocker, to protect against DMAattacks via Thunderbolt 3 ports. In October 2017, it...
The DMA Buffer Sharing API (often abbreviated as DMA-BUF) is a Linux kernel internal API designed to provide a generic mechanism to share DMA buffers...
action-adventure video game for the Nintendo 64 video game console, developed by DMA Design. It was intended to be a Nintendo 64 launch title, but was delayed...
user because of the direct memory access (DMA) architecture of modern computers and the potential for DMAattacks.[citation needed] Theo de Raadt of OpenBSD...
Grand Theft Auto III is a 2001 action-adventure game developed by DMA Design and published by Rockstar Games. It is the third main entry in the Grand...
hardware, and for setting screen resolution, color depth and refresh rate DMA buffers (DMA-BUF) – for sharing buffers for hardware direct memory access across...
N,N-Dimethylaniline (DMA) is an organic chemical compound, a substituted derivative of aniline. It is a tertiary amine, featuring a dimethylamino group...
VIA PadLock processors. In 2012 a paper called TRESOR-HUNT showed how a DMAattack could break this system, by injecting code that would invisibly function...
Code Integrity (HVCI) UEFI Secure Boot Protection against malicious attacks via the DMA path DNS over HTTPS AES-256 encryption of SMB traffic SMB over QUIC...
1994-02-25 Ultimate Race Pro Kalisto Entertainment MicroProse WIN 1997 Uniracers DMA Design Nintendo SNES 1994-12 Up'n Down Sega Sega Arcade, A2600, ATR, CLV...
pioneering work on Artificial Intelligence in Heart attack patients[citation needed] 2021 Received DMA Excellence award award: for outstanding contribution...