Microsoft has put a lot of effort in Hyper-V security. Hyper-V, and the whole virtualization stack, runs at the core of many of our products: cloud computing, Windows Defender Application Guard, and technology built on top of Virtualization Based Security (VBS). Because Hyper-V is critical to so much of what we do, we want to encourage researchers to study it and tell us about the vulnerabilities they find: we even offer a $250K bounty for those who do.
Print
Share
Comment
Cite
Upload
Translate

APA
() » First Steps in Hyper-V Research. Retrieved from https://www.truth.cx/2018/12/10/first-steps-in-hyper-v-research/.
MLA" » First Steps in Hyper-V Research." - , https://www.truth.cx/2018/12/10/first-steps-in-hyper-v-research/
HARVARD » First Steps in Hyper-V Research., viewed ,
VANCOUVER - » First Steps in Hyper-V Research. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2018/12/10/first-steps-in-hyper-v-research/
CHICAGO" » First Steps in Hyper-V Research." - Accessed . https://www.truth.cx/2018/12/10/first-steps-in-hyper-v-research/
IEEE" » First Steps in Hyper-V Research." [Online]. Available: https://www.truth.cx/2018/12/10/first-steps-in-hyper-v-research/. [Accessed: ]