{"id":"https://openalex.org/W2332912570","doi":"https://doi.org/10.1145/2872362.2872379","title":"True IOMMU Protection from DMA Attacks","display_name":"True IOMMU Protection from DMA Attacks","publication_year":2016,"publication_date":"2016-03-25","ids":{"openalex":"https://openalex.org/W2332912570","doi":"https://doi.org/10.1145/2872362.2872379","mag":"2332912570"},"language":"en","primary_location":{"id":"doi:10.1145/2872362.2872379","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2872362.2872379","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069205594","display_name":"Alex Markuze","orcid":null},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Alex Markuze","raw_affiliation_strings":["Technion---Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion---Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101431627","display_name":"Adam Morrison","orcid":"https://orcid.org/0000-0002-5586-2615"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Adam Morrison","raw_affiliation_strings":["Technion---Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion---Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5079290490","display_name":"Dan Tsafrir","orcid":"https://orcid.org/0000-0002-9242-3144"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Dan Tsafrir","raw_affiliation_strings":["Technion---Israel Institute of Technology, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion---Israel Institute of Technology, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5069205594"],"corresponding_institution_ids":["https://openalex.org/I174306211"],"apc_list":null,"apc_paid":null,"fwci":10.6643,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.98215737,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"249","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8141138553619385},{"id":"https://openalex.org/keywords/copying","display_name":"Copying","score":0.750128984451294},{"id":"https://openalex.org/keywords/synchronizing","display_name":"Synchronizing","score":0.6546702980995178},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5594131946563721},{"id":"https://openalex.org/keywords/granularity","display_name":"Granularity","score":0.5292966365814209},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4954336881637573},{"id":"https://openalex.org/keywords/protection-mechanism","display_name":"Protection mechanism","score":0.4911046028137207},{"id":"https://openalex.org/keywords/memory-protection","display_name":"Memory protection","score":0.48209503293037415},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.45432204008102417},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4204162359237671},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.4084039628505707},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.40178224444389343},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35413265228271484},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3152357339859009},{"id":"https://openalex.org/keywords/memory-management","display_name":"Memory management","score":0.20731881260871887},{"id":"https://openalex.org/keywords/virtual-memory","display_name":"Virtual memory","score":0.17894494533538818},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.15278753638267517}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8141138553619385},{"id":"https://openalex.org/C2779151265","wikidata":"https://www.wikidata.org/wiki/Q1156791","display_name":"Copying","level":2,"score":0.750128984451294},{"id":"https://openalex.org/C162932704","wikidata":"https://www.wikidata.org/wiki/Q1058791","display_name":"Synchronizing","level":3,"score":0.6546702980995178},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5594131946563721},{"id":"https://openalex.org/C177774035","wikidata":"https://www.wikidata.org/wiki/Q1246948","display_name":"Granularity","level":2,"score":0.5292966365814209},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4954336881637573},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.4911046028137207},{"id":"https://openalex.org/C18131444","wikidata":"https://www.wikidata.org/wiki/Q163585","display_name":"Memory protection","level":5,"score":0.48209503293037415},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.45432204008102417},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4204162359237671},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.4084039628505707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.40178224444389343},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35413265228271484},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3152357339859009},{"id":"https://openalex.org/C176649486","wikidata":"https://www.wikidata.org/wiki/Q2308807","display_name":"Memory management","level":3,"score":0.20731881260871887},{"id":"https://openalex.org/C76399640","wikidata":"https://www.wikidata.org/wiki/Q189401","display_name":"Virtual memory","level":4,"score":0.17894494533538818},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.15278753638267517},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.0},{"id":"https://openalex.org/C98986596","wikidata":"https://www.wikidata.org/wiki/Q1143031","display_name":"Semiconductor memory","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2872362.2872379","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2872362.2872379","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6100000143051147,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4525482839","display_name":null,"funder_award_id":"1227/10 and 1749/14","funder_id":"https://openalex.org/F4320322252","funder_display_name":"Israel Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320322252","display_name":"Israel Science Foundation","ror":"https://ror.org/04sazxf24"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W162878183","https://openalex.org/W1035302160","https://openalex.org/W1577966481","https://openalex.org/W1583301963","https://openalex.org/W1726624971","https://openalex.org/W1734799737","https://openalex.org/W1746694335","https://openalex.org/W1772960743","https://openalex.org/W2018045700","https://openalex.org/W2039880889","https://openalex.org/W2094041165","https://openalex.org/W2096165352","https://openalex.org/W2098656140","https://openalex.org/W2099480851","https://openalex.org/W2120457453","https://openalex.org/W2131195907","https://openalex.org/W2143642500","https://openalex.org/W2146878883","https://openalex.org/W2153950928","https://openalex.org/W2170761533","https://openalex.org/W2171882483","https://openalex.org/W2183498979","https://openalex.org/W2265366104","https://openalex.org/W2285586092","https://openalex.org/W4254268637"],"related_works":["https://openalex.org/W2121834345","https://openalex.org/W1938417886","https://openalex.org/W2348023445","https://openalex.org/W1547443099","https://openalex.org/W2112415002","https://openalex.org/W2624708500","https://openalex.org/W2095338830","https://openalex.org/W2610731468","https://openalex.org/W2136736275","https://openalex.org/W3022774462"],"abstract_inverted_index":{"Malicious":[0],"I/O":[1],"devices":[2,85],"might":[3],"compromise":[4],"the":[5,13,62,95,138,147,156],"OS":[6,10],"using":[7],"DMAs.":[8],"The":[9],"therefore":[11],"utilizes":[12],"IOMMU":[14,96,158],"to":[15,33,76,113,155,167],"map":[16],"and":[17,24,68,124,152],"unmap":[18],"every":[19],"target":[20],"buffer":[21,73],"right":[22],"before":[23],"after":[25],"its":[26],"DMA":[27,57,72,118],"is":[28,41,145],"processed,":[29],"thereby":[30],"restricting":[31],"DMAs":[32],"their":[34],"designated":[35],"locations.":[36],"This":[37],"usage":[38,108],"model,":[39],"however,":[40],"not":[42],"truly":[43],"secure":[44],"for":[45,160],"two":[46,104],"reasons:":[47],"(1)":[48],"it":[49,70,125],"provides":[50],"protection":[51,135,162],"at":[52],"page":[53,64],"granularity":[54],"only,":[55],"whereas":[56],"buffers":[58,119],"can":[59,86],"reside":[60],"on":[61],"same":[63],"as":[65],"other":[66],"data;":[67],"(2)":[69],"delays":[71],"unmaps":[74],"due":[75],"performance":[77],"considerations,":[78],"creating":[79],"a":[80,99,114],"vulnerability":[81,140],"window":[82],"in":[83,98],"which":[84],"access":[87,112,154],"in-use":[88],"memory.":[89],"We":[90],"propose":[91],"that":[92,101,120,146],"OSes":[93],"utilize":[94],"differently,":[97],"manner":[100],"eliminates":[102],"these":[103,130],"flaws.":[105],"Our":[106,142],"new":[107],"model":[109],"restricts":[110],"device":[111],"set":[115],"of":[116,149],"shadow":[117],"are":[121],"never":[122],"unmapped,":[123],"copies":[126],"DMAed":[127],"data":[128],"to/from":[129],"buffers,":[131],"thus":[132],"providing":[133],"sub-page":[134],"while":[136],"eliminating":[137],"aforementioned":[139],"window.":[141],"key":[143],"insight":[144],"cost":[148],"interacting":[150],"with,":[151],"synchronizing":[153],"slow":[157],"hardware---required":[159],"zero-copy":[161],"against":[163],"devices---make":[164],"copying":[165],"preferable":[166],"zero-copying.":[168]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":7},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
