[vbox-dev] VirtualBox DMA Security?
joshx90 at hotmail.com
Fri Dec 10 03:54:11 PST 2010
I have an interest in virtualisation security and I've been reading into the potential DMA access security issues in virtualisation.
According to one presentation:
"- Untrusted guest programs a device, without any supervision.
- Device is DMA capable (all modern devices are).
- Which means the guest can program the device to
overwrite any memory location.
- Including where the hypervisor lives . . . game over."
How does DMA access work in VirtualBox? I've been unable to find any information on this.
Is VirtualBox vulnerable to this kind of attack?
All thoughts and links to relevant information are appreciated!
More information about the vbox-dev