DMA ATTACKS DEFENSES: HOW TO PROTECT AGAINST THESE SILENT THREATS