ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY
us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security
us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
aCG scenario 2upa<br />
• Credential Guard with armor key protection and<br />
smartcard-based authentication<br />
• Nontrivial deployment challenge<br />
• Possible to enable without TPM, but in such<br />
case no real advantage