HOW DMA PROTECTION SECURES SYSTEMS FROM HARDWARE-LEVEL THREATS