In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, “First Steps in Hyper-V Research”, describes the tools and setup for debugging the hypervisor and examines the interesting attack surfaces of the virtualization stack components. We then published “Fuzzing para-virtualized devices in Hyper-V”, which has been the focus of our friends at the Virtualization Security Team.
Print
Share
Comment
Cite
Upload
Translate
APA
() » Attacking the VM Worker Process. Retrieved from https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/.
MLA" » Attacking the VM Worker Process." - , https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/
HARVARD » Attacking the VM Worker Process., viewed ,
VANCOUVER - » Attacking the VM Worker Process. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/
CHICAGO" » Attacking the VM Worker Process." - Accessed . https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/
IEEE" » Attacking the VM Worker Process." [Online]. Available: https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/. [Accessed: ]