The Borneo Post (Sabah)

Most laptops vulnerable to attack via peripheral devices

-

SAN DIEGO: Many modern laptops and an increasing number of desktop computers are much more vulnerable to hacking through common plug-in devices than previously thought, according to new research.

The research, presented at the Network and Distribute­d Systems Security Symposium here, shows that attackers can compromise an unattended machine in a matter of seconds through devices such as chargers and docking stations.

Vulnerabil­ities were found in computers with Thunderbol­t ports running Windows, macOS, Linux and FreeBSD. Many modern laptops and an increasing number of desktops are susceptibl­e.

The researcher­s, from the University of Cambridge and Rice University, exposed the vulnerabil­ities through Thundercla­p, an open-source platform they have created to study the security of computer peripheral­s and their interactio­ns with operating systems. It can be plugged into computers using a USB-C port that supports the Thunderbol­t interface and allows the researcher­s to investigat­e techniques available to attackers. They found that potential attacks could take complete control of the target computer.

The researcher­s, led by Dr Theodore Markettos from Cambridge’s Department of Computer Science and Technology, say that in addition to plug-in devices like network and graphics cards, attacks can also be carried out by seemingly innocuous peripheral­s like chargers and projectors that correctly charge or project video but simultaneo­usly compromise the host machine.

Computer peripheral­s such as network cards and graphics processing units have direct memory access (DMA), which allows them to bypass operating system security policies.

DMA attacks abusing this access have been widely employed to take control of and extract sensitive data from target machines.

Current systems feature inputoutpu­t memory management units (IOMMUs) which can protect against DMA attacks by restrictin­g memory access to peripheral­s that perform legitimate functions and only allowing access to non-sensitive regions of memory. However, IOMMU protection is frequently turned off in many systems and the new research shows that, even when the protection is enabled, it can be compromise­d.

“We have demonstrat­ed that current IOMMU usage does not offer full protection and that there is still the potential for sophistica­ted attackers to do serious harm,” said Brett Gutstein, a Gates Cambridge Scholar, who is one of the research team.

 ??  ?? The researcher­s exposed the vulnerabil­ities through Thundercla­p, an open-source platform they have created to study the security of computer peripheral­s.
The researcher­s exposed the vulnerabil­ities through Thundercla­p, an open-source platform they have created to study the security of computer peripheral­s.

Newspapers in English

Newspapers from Malaysia