05.08.2016 Views

ANALYSIS OF THE ATTACK SURFACE OF WINDOWS 10 VIRTUALIZATION-BASED SECURITY

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

us-16-Wojtczuk-Analysis-Of-The-Attack-Surface-Of-Windows-10-Virtualization-Based-Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Necessary support<br />

• Secureboot<br />

– many vulnerabilities in the past allowing secureboot<br />

bypass<br />

• VTd<br />

– without it, possible to overwrite hypervisor via DMA<br />

• TPM<br />

– needed to secure S4, see below

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!