DMA allows network card to read/write RAM.

DMA attack allows one already-compromised VM to read the RAM of another VM, 
thus breaching Qubes isolation... unless you use VT-D, although flaws in VT-D 
have been shown.

Remote DMA attack allows packets sent to the network card directly over the 
web, not even having to compromise your VM first... as demonstrated in the 
paper by the French intel agency.

That is what I understand so far. Hence, why I am asking if using PIO rather 
than DMA would prevent such attacks.

-- 
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/8d3ffc8d-8658-4a32-b3aa-7c486b653e15%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to