YoVDO

Myth and Truth About Hypervisor-Based Kernel Protector - The Reason Why You Need Shadow-Box

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Rootkits Courses ARM TrustZone Courses

Course Description

Overview

Explore the intricacies of hypervisor-based kernel protection in this informative Black Hat conference talk. Delve into the limitations of kernel-level protection mechanisms and understand why higher privilege levels are necessary to combat security threats like rootkits and kernel exploits. Learn about the concept of creating Ring -1 using virtualization technologies such as ARM TrustZone, Intel VT-x, and AMD AMD-v. Discover how existing virtualization technologies support the separation of worlds into host and guest environments. Presented by Seunghun Han and Junghwan Kang, this 38-minute talk provides valuable insights into the myths and truths surrounding hypervisor-based kernel protectors and introduces the Shadow-Box solution.

Syllabus

Myth and Truth About Hypervisor-Based Kernel Protector: The Reason Why You Need Shadow-Box


Taught by

Black Hat

Related Courses

Systems & Networks Seminar - Andrew Bauman - Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software
Paul G. Allen School via YouTube
fTPM - A Software-Only Implementation of a TPM Chip
USENIX via YouTube
Trusted Execution Environments - A Technical Overview of Intel SGX, Arm TrustZone, and RISC-V PMP
Linux Foundation via YouTube
Forging the USB Armory
44CON Information Security Conference via YouTube
RT-TEE - Real-time System Availability for Cyber-physical Systems using ARM TrustZone
IEEE via YouTube