Abstract
DPR introduces unprecedented flexibility and performance in contemporary hardware architectures, yet it also unveils critical security vulnerabilities that demand in-depth analysis. This paper investigates a novel exploitation scenario involving DMA attacks targeting the IOMMU within dynamically reconfigurable environments. We demonstrate how a MHA can manipulate device identity mechanisms to circumvent IOMMU safeguards, thereby gaining unauthorized access to protected memory regions. These findings expose a fundamental security gap in the management of reconfigurable systems and underscore the necessity for comprehensive countermeasures. By outlining prospective avenues for mitigation, this work provides a conceptual framework to inspire and guide the development of robust security mechanisms tailored to dynamically adaptable architectures.
Type
Publication
In 32nd Reconfigurable Architectures Workshop