05.08.2016 Views

ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Kernel HVCI is based on secvisor<br />

• Separate EPT for code originating from signed<br />

and unsigned page<br />

• Root partition is configured so that any attempt<br />

by unsigned usermode code to enter<br />

kernelmode results in vmexit (and EPT flip)<br />

–IDT, GDT limits set to 0, syscall&sysenter disabled

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!