GPU-mediated direct-memory-access attacks in a smart phone
- 👤 Speaker: Marta Piekarska, Technische Universität Berlin
- 📅 Date & Time: Friday 23 August 2013, 16:00 - 16:45
- 📍 Venue: Computer Laboratory, William Gates Building, Room FW11
Abstract
Most modern smart phones are equipped with a Graphics Processing Unit (GPU), which takes care of rendering graphics, taking the workload off the CPU . For efficiency reasons, GPUs get Direct Memory Access (DMA), so that they can access any part of both kernel and user space memory. DMA attacks via FireWire and other PCI devices are well known and publicised. In this talk, I present a DMA attack using the GPU . The theoretical model holds for any device with GPU . Errors in the driver implementation of the Mali GPU on Samsung Galaxy SII phones allowed me to create a proof-of-concept exploit, which I will describe. I start off by describing the GPU programming model and processing pipeline, followed by an analysis of Mali Memory Management, and the flaws that enabled me to perform the DMA attack on Samsung Galaxy SII phones. I will explain different approaches for creating an exploit.
Series This talk is part of the Computer Laboratory Security Group meeting presentations series.
Included in Lists
- All Talks (aka the CURE list)
- bld31
- Cambridge talks
- Computer Laboratory Security Group meeting presentations
- Computer Laboratory, William Gates Building, Room FW11
- Department of Computer Science and Technology talks and seminars
- Interested Talks
- School of Technology
- Security-related talks
- Trust & Technology Initiative - interesting events
- yk449
Note: Ex-directory lists are not shown.
![[Talks.cam]](/static/images/talkslogosmall.gif)


Friday 23 August 2013, 16:00-16:45