Fig. 3From: IOMMU protection against I/O attacks: a vulnerability and a proof of conceptVulnerability and write time windowsBack to article page