Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

Analysis of the Attack Surface of Windows 10 Virtualization-Based Security

Getting Started with Debugging Hyper-V for Vulnerability ResearchПодробнее

Getting Started with Debugging Hyper-V for Vulnerability Research

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-ExploitationПодробнее

Close Encounters of the Advanced Persistent Kind: Leveraging Rootkits for Post-Exploitation

Breaking VSM by Attacking SecureKernelПодробнее

Breaking VSM by Attacking SecureKernel

Analysis of the Attack Surface of Windows 10 Virtualization Based SecurityПодробнее

Analysis of the Attack Surface of Windows 10 Virtualization Based Security

MS Cybersecurity Pro Track Windows 10 Security FeaturesПодробнее

MS Cybersecurity Pro Track Windows 10 Security Features

[BSL2022] Windows kernel rootkits for red teams - André LimaПодробнее

[BSL2022] Windows kernel rootkits for red teams - André Lima

Breaking VSM by Attacking SecureKernelПодробнее

Breaking VSM by Attacking SecureKernel

eBPF ELFs JMPing Through the WindowsПодробнее

eBPF ELFs JMPing Through the Windows

Windows 10: Permanently disable VBS (Virtualization-based security)? (3 Solutions!!)Подробнее

Windows 10: Permanently disable VBS (Virtualization-based security)? (3 Solutions!!)

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest SummitПодробнее

Windows 10 Kernel Mitigations and Exploitation w/ Jaime Geiger & Stephen Sims - SANS HackFest Summit

Xenpwn: Breaking Paravirtualized DevicesПодробнее

Xenpwn: Breaking Paravirtualized Devices

[2017] Nested Virtualization: Hyper-V on KVM by Ladi ProsekПодробнее

[2017] Nested Virtualization: Hyper-V on KVM by Ladi Prosek

BSides Rochester 2018 - Virtualization Based Security Strengths and WeaknessesПодробнее

BSides Rochester 2018 - Virtualization Based Security Strengths and Weaknesses

Black Hat USA 2016 Analysis of the Attack Surface of Windows 10 Virtualization Based SecurityПодробнее

Black Hat USA 2016 Analysis of the Attack Surface of Windows 10 Virtualization Based Security

Kernel Mode Threats and Practical DefensesПодробнее

Kernel Mode Threats and Practical Defenses

A Retrospective Case Study of VMware Guest-to-Host Escape VulnerabilitiesПодробнее

A Retrospective Case Study of VMware Guest-to-Host Escape Vulnerabilities

Into the Core: In-Depth Exploration of Windows 10 IoT CoreПодробнее

Into the Core: In-Depth Exploration of Windows 10 IoT Core

Real life hacks for Windows and Office... and how to stop them (Microsoft Ignite)Подробнее

Real life hacks for Windows and Office... and how to stop them (Microsoft Ignite)

Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface YetПодробнее

Windows Notification Facility: Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet