Linked by David Adams on Fri 2nd Mar 2012 16:03 UTC
Privacy, Security, Encryption When was the last time you reverse-engineered all the PCI devices on your motherboard?. . . Enters the game-changer: IOMMU (known as VT-d on Intel). With proper OS/VMM design, this technology can address the very problem of most of the hardware backdoors. A good example of a practical system that allows for that is Xen 3.3, which supports VT-d and allows you to move drivers into a separate, unprivileged driver domain(s). This way each PCI device can be limited to DMA only to the memory region occupied by its own driver.
Permalink for comment 509445
To read all comments associated with this story, please click here.
RE[2]: Comment by Nico57
by renox on Sat 3rd Mar 2012 09:59 UTC in reply to "RE: Comment by Nico57"
Member since:

It is interesting article.
Another interesting "fact" I've heard is that in many cases the IO-MMU was disabled because it was buggy.

I don't know if this is still the case now, but that's interesting, no?
Even if the CPU has an IO-MMU doesn't mean that it is used..

Reply Parent Score: 2