BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//Talks.cam//talks.cam.ac.uk//
X-WR-CALNAME:Talks.cam
BEGIN:VEVENT
SUMMARY:GPU-mediated direct-memory-access attacks in a smart phone - Marta
  Piekarska\, Technische Universität Berlin
DTSTART:20130823T150000Z
DTEND:20130823T154500Z
UID:TALK46303@talks.cam.ac.uk
CONTACT:Markus Kuhn
DESCRIPTION:Most modern smart phones are equipped with a Graphics Processi
 ng Unit (GPU)\, which takes care of rendering graphics\, taking the worklo
 ad off the CPU. For efficiency reasons\, GPUs get Direct Memory Access (DM
 A)\, so that they can access any part of both kernel and user space memory
 . DMA attacks via FireWire and other PCI devices are well known and public
 ised. In this talk\, I present a DMA attack using the GPU. The theoretical
  model holds for any device with GPU. Errors in the driver implementation 
 of the Mali GPU on Samsung Galaxy SII phones allowed me to create a proof-
 of-concept exploit\, which I will describe. I start off by describing the 
 GPU programming model and processing pipeline\, followed by an analysis of
  Mali Memory Management\, and the flaws that enabled me to perform the DMA
  attack on Samsung Galaxy SII phones. I will explain different approaches 
 for creating an exploit.\n
LOCATION:Computer Laboratory\, William Gates Building\, Room FW11
END:VEVENT
END:VCALENDAR
