Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the intricacies of hypervisor-based kernel protection in this informative Black Hat conference talk. Delve into the limitations of kernel-level protection mechanisms and understand why higher privilege levels are necessary to combat security threats like rootkits and kernel exploits. Learn about the concept of creating Ring -1 using virtualization technologies such as ARM TrustZone, Intel VT-x, and AMD AMD-v. Discover how existing virtualization technologies support the separation of worlds into host and guest environments. Presented by Seunghun Han and Junghwan Kang, this 38-minute talk provides valuable insights into the myths and truths surrounding hypervisor-based kernel protectors and introduces the Shadow-Box solution.
Syllabus
Myth and Truth About Hypervisor-Based Kernel Protector: The Reason Why You Need Shadow-Box
Taught by
Black Hat
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network