{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:55:22Z","timestamp":1763499322177,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485359","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"2453-2455","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["POSTER: OS Independent Fuzz Testing of I\/O Boundary"],"prefix":"10.1145","author":[{"given":"Masanori","family":"Misono","sequence":"first","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]},{"given":"Takahiro","family":"Shinagawa","sequence":"additional","affiliation":[{"name":"The University of Tokyo, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"FreeBSD 13.0. 2021. FreeBSD Kernel Developer's Manual BUS_DMA(9) . https:\/\/www.freebsd.org\/cgi\/man.cgi?bus_dma Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_2_1","volume-title":"mbox","author":"Markuze Alex","year":"2021","unstructured":"Markuze Alex et almbox. 2021. Characterizing, Exploiting, and Detecting DMA Code Injection Vulnerabilities in the Presence of an IOMMU. In EuroSys'21. ACM."},{"key":"e_1_3_2_1_3_1","volume-title":"BHUSA'17 .","author":"Artenstein Nitay","year":"2017","unstructured":"Nitay Artenstein. 2017. BROADPWN: Remotely Compromising Android and IOS via a Bug in Broadcom's Wi-Fi Chipsets. In BHUSA'17 ."},{"key":"e_1_3_2_1_4_1","volume-title":"mbox","author":"Damien Aumaitre","year":"2010","unstructured":"Damien Aumaitre et almbox. 2010. Subverting Windows 7 x64 Kernel with DMA Attacks. In HITB'10 ."},{"key":"e_1_3_2_1_5_1","volume-title":"mbox","author":"Bai Jia-Ju","year":"2021","unstructured":"Jia-Ju Bai et almbox. 2021. Static Detection of Unsafe DMA Accesses in Device Drivers. In USENIX SEC'21 ."},{"key":"e_1_3_2_1_6_1","volume":"201","author":"James","unstructured":"James E.J. Bottomley. 2019. Dynamic DMA Mapping Using the Generic Device . https:\/\/www.kernel.org\/doc\/Documentation\/DMA-API.txt Retrieved 2021-08--16 from","journal-title":"J. Bottomley."},{"key":"e_1_3_2_1_7_1","volume-title":"mbox","author":"Yaohui Chen","year":"2019","unstructured":"Yaohui Chen et almbox. 2019. Ptrix: Efficient Hardware-Assisted Fuzzing for COTS Binary. In ASIACCS'19 ."},{"key":"e_1_3_2_1_8_1","volume-title":"mbox","author":"Jake Corina","year":"2017","unstructured":"Jake Corina et almbox. 2017. DIFUZE: Interface Aware Fuzzing for Kernel Drivers. In CCS'17 ."},{"key":"e_1_3_2_1_9_1","unstructured":"Google. 2021. Syzkaller -- Kernel Fuzzer . https:\/\/github.com\/google\/syzkaller Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_10_1","first-page":"08","volume":"202","author":"Virtualization AMD","unstructured":"AMD inc. 2011. AMD I\/O Virtualization Technology (IOMMU) Specification . http:\/\/developer.amd.com\/wordpress\/media\/2012\/10\/488821.pdf Retrieved 2021-08--16 from","journal-title":"Retrieved"},{"key":"e_1_3_2_1_11_1","unstructured":"Intel. 2018. Thunderbolt#8482; 3 and Security on Microsoft Windows\u00ae 10 Operating system . https:\/\/thunderbolttechnology.net\/security\/Thunderbolt%203%20and%20Security.pdf Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_12_1","unstructured":"Intel. 2019. Intel\u00ae Virtualization Technology for Directed I\/O Architecture Specification Rev 3.1 . https:\/\/software.intel.com\/en-us\/download\/intel-virtualization-technology-for-directed-io-architecture-specification Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_13_1","volume-title":"mbox","author":"Asim Kadav","year":"2009","unstructured":"Asim Kadav et almbox. 2009. Tolerating Hardware Device Failures in Software. In SOSP'09 ."},{"key":"e_1_3_2_1_14_1","first-page":"08","volume":"202","author":"Code Linux","unstructured":"Linux kernel documentation. 2019. kcov: Code Coverage for Fuzzing . https:\/\/www.kernel.org\/doc\/Documentation\/dev-tools\/kcov.rst Retrieved 2021-08--16 from","journal-title":"Retrieved"},{"key":"e_1_3_2_1_15_1","volume-title":"mbox","author":"A. Theodore Markettos","year":"2019","unstructured":"A. Theodore Markettos et almbox. 2019. Thunderclap: Exploring Vulnerabilities in Operating System IOMMU Protection via DMA from Untrustworthy Peripherals. In NDSS'19 ."},{"key":"e_1_3_2_1_16_1","volume-title":"mbox","author":"Masanori Misono","year":"2018","unstructured":"Masanori Misono et almbox. 2018. FaultVisor2: Testing Hypervisor Device Drivers Against Real Hardware Failures. In CloudCom'18 ."},{"key":"e_1_3_2_1_17_1","volume-title":"USENIX SEC'20 .","author":"Peng Hui","year":"2020","unstructured":"Hui Peng and Others. 2020. USBFuzz: A Framework for Fuzzing USB Drivers by Device Emulation. In USENIX SEC'20 ."},{"key":"e_1_3_2_1_18_1","unstructured":"James Reinders. 2013. Processor Tracing | Intel\u00ae Software . https:\/\/software.intel.com\/en-us\/blogs\/2013\/09\/18\/processor-tracing Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_19_1","volume-title":"mbox","author":"Sergej Schumilo","year":"2017","unstructured":"Sergej Schumilo et almbox. 2017. kAFL: Hardware-Assisted Feedback Fuzzing for OS Kernels. In USENIX SEC'17 ."},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX SEC'17 .","author":"Serebryany Kostya","year":"2017","unstructured":"Kostya Serebryany. 2017. OSS-Fuzz - Google's Continuous Fuzzing Service for Open Source Software (Invited Talk). In USENIX SEC'17 ."},{"key":"e_1_3_2_1_21_1","volume-title":"mbox","author":"Takahiro Shinagawa","year":"2009","unstructured":"Takahiro Shinagawa et almbox. 2009. BitVisor: A Thin Hypervisor for Enforcing I\/O Device Security. In VEE'09 ."},{"key":"e_1_3_2_1_22_1","volume-title":"mbox","author":"Dokyung Song","year":"2019","unstructured":"Dokyung Song et almbox. 2019. PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary. In NDSS'19 ."},{"key":"e_1_3_2_1_23_1","volume-title":"mbox","author":"Dokyung Song","year":"2020","unstructured":"Dokyung Song et almbox. 2020. Agamotto: Accelerating Kernel Driver Fuzzing with Lightweight Virtual Machine Checkpoints. In USENIX SEC'20 ."},{"key":"e_1_3_2_1_24_1","volume-title":"mbox","author":"Satoru Takekoshi","year":"2016","unstructured":"Satoru Takekoshi et almbox. 2016. Testing Device Drivers Against Hardware Failures in Real Environments. In SAC'16 ."},{"key":"e_1_3_2_1_25_1","volume-title":"mbox","author":"Seyed Talebi Seyed Mohammadjavad","year":"2018","unstructured":"Seyed Mohammadjavad Seyed Talebi et almbox. 2018. Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems. In USENIX SEC'18 ."},{"key":"e_1_3_2_1_26_1","volume-title":"mbox","author":"Fabian Toepfer","year":"2021","unstructured":"Fabian Toepfer et almbox. 2021. BSOD: Binary-only Scalable Fuzzing of Device Drivers. In RAID'21 ."},{"key":"e_1_3_2_1_27_1","unstructured":"UEFI Forum Inc. 2019. Advanced Configuration and Power Interface (ACPI) Specification Version 6.3 . https:\/\/uefi.org\/sites\/default\/files\/resources\/ACPI_6_3_final_Jan30.pdf Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_28_1","volume-title":"mbox","author":"Jiewen Yao","year":"2017","unstructured":"Jiewen Yao et almbox. 2017. A Tour Beyond BIOS: Using IOMMU for DMA Protection in UEFI Firmware . https:\/\/firmware.intel.com\/sites\/default\/files\/Intel_WhitePaper_Using_IOMMU_for_DMA_Protection_in_UEFI.pdf Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_29_1","unstructured":"Michal Zalewsk. 2015. American Fuzzy Lop . http:\/\/lcamtuf.coredump.cx\/afl\/ Retrieved 2021-08--16 from"},{"key":"e_1_3_2_1_30_1","volume-title":"mbox","author":"Gen Zhang","year":"2018","unstructured":"Gen Zhang et almbox. 2018. PTfuzz: Guided Fuzzing With Processor Trace Feedback. IEEE Access (2018)."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event Republic of Korea","acronym":"CCS '21"},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485359","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:49:24Z","timestamp":1763498964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485359"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":30,"alternative-id":["10.1145\/3460120.3485359","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485359","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}