Attacking the VM Worker Process

In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, “First Steps in Hyper-V Research”, describes the tools and setup for debugging the hypervisor and examines the interesting attack surfa…

In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, “First Steps in Hyper-V Research”, describes the tools and setup for debugging the hypervisor and examines the interesting attack surfaces of the virtualization stack components. We then published “Fuzzing para-virtualized devices in Hyper-V”, which has been the focus of our friends at the Virtualization Security Team.


Print Share Comment Cite Upload Translate
APA
() » Attacking the VM Worker Process. Retrieved from https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/.
MLA
" » Attacking the VM Worker Process." - , https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/
HARVARD
» Attacking the VM Worker Process., viewed ,
VANCOUVER
- » Attacking the VM Worker Process. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/
CHICAGO
" » Attacking the VM Worker Process." - Accessed . https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/
IEEE
" » Attacking the VM Worker Process." [Online]. Available: https://www.truth.cx/2019/09/11/attacking-the-vm-worker-process/. [Accessed: ]
Select a language: