ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY
us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security
us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Necessary support<br />
• Secureboot<br />
– many vulnerabilities in the past allowing secureboot<br />
bypass<br />
• VTd<br />
– without it, possible to overwrite hypervisor via DMA<br />
• TPM<br />
– needed to secure S4, see below