Attacking Hypervisors Using Firmware And Hardware

Attacking Hypervisors Using Firmware And Hardware

Освоение UEFI: руководство по прошивке и безопасности загрузочной цепочкиПодробнее

Освоение UEFI: руководство по прошивке и безопасности загрузочной цепочки

One Glitch to Rule Them All: Fault Injection Attacks Against the AMD Secure ProcessorПодробнее

One Glitch to Rule Them All: Fault Injection Attacks Against the AMD Secure Processor

Upcoming x86 Technologies for Malicious Hypervisor Protection - David Kaplan, AMDПодробнее

Upcoming x86 Technologies for Malicious Hypervisor Protection - David Kaplan, AMD

USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host OperatingПодробнее

USENIX Security '19 - Protecting Cloud Virtual Machines from Hypervisor and Host Operating

Alex Matrosov - The Advanced Threats Evolution: REsearchers Arm Race - Ekoparty 2019Подробнее

Alex Matrosov - The Advanced Threats Evolution: REsearchers Arm Race - Ekoparty 2019

[2019] Core-Scheduling for Virtualization: Where are We? (If We Want It!) by Dario FaggioliПодробнее

[2019] Core-Scheduling for Virtualization: Where are We? (If We Want It!) by Dario Faggioli

Escaping Virtualized ContainersПодробнее

Escaping Virtualized Containers

Robert Buhren (TU Berlin) - Fault Injection Attacks against AMD’s Secure Encrypted VirtualizationПодробнее

Robert Buhren (TU Berlin) - Fault Injection Attacks against AMD’s Secure Encrypted Virtualization

A Dive in to Hyper-V Architecture & VulnerabilitiesПодробнее

A Dive in to Hyper-V Architecture & Vulnerabilities

ECC'17: Exploring Your System Deeper with CHIPSEC is Not NaughtyПодробнее

ECC'17: Exploring Your System Deeper with CHIPSEC is Not Naughty

PoC Xen exploit from Dom0 via vulnerable firmware implementationПодробнее

PoC Xen exploit from Dom0 via vulnerable firmware implementation

Oleksandr Bazhaniuk - Software Attacks on Different Type of System Firmware - H2HC 2017Подробнее

Oleksandr Bazhaniuk - Software Attacks on Different Type of System Firmware - H2HC 2017

PoC Hyper-V exploit from root partition through SMM firmwareПодробнее

PoC Hyper-V exploit from root partition through SMM firmware

ZeroNights 2015 Alexander Matrosov Attacking hypervisors using firmware and hardwareПодробнее

ZeroNights 2015 Alexander Matrosov Attacking hypervisors using firmware and hardware

PoC UEFI firmware rootkit steals secrets from virtual machinesПодробнее

PoC UEFI firmware rootkit steals secrets from virtual machines

Bootstraping a slightly more secure laptop (33c3)Подробнее

Bootstraping a slightly more secure laptop (33c3)

ZeroNights 2016 Alexander Matrosov Attacking hypervisors using firmware and hardwareПодробнее

ZeroNights 2016 Alexander Matrosov Attacking hypervisors using firmware and hardware

Analysis of the Attack Surface of Windows 10 Virtualization-Based SecurityПодробнее

Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

#HITB2016AMS D2T2 - Advanced Exploitation: Xen Hypervisor VM Escape - Shangcong LuanПодробнее

#HITB2016AMS D2T2 - Advanced Exploitation: Xen Hypervisor VM Escape - Shangcong Luan