http://invisiblethingslab.com/itl/Resources.html

Firmware/CPU/Chipset security (2009)

Attacking Intel® Trusted Execution Technology (Black Hat DC, Feb 2009)

by Rafal Wojtczuk and Joanna Rutkowska

Press releases: Announcement PR (PDF), Post-conference PR (PDF)

Blog commentary: announcement

Paper & Slides: Paper (PDF), Slides (PDF), Slides (Keynote), Slides (MOV)

Code: [to be published once Intel patches the firmware]

Adventures with a certain Xen vulnerability (Oct 2008)

by Rafal Wojtczuk

Paper: PDF

Security Challenges in Virtualized Environments (RSA Conference, Apr 2008) by Joanna Rutkowska

(presents nested virtualization on AMD-v)

Code and demos: here

Blog commentary: nested virtualization

IsGameOver(), anyone? (Black Hat USA, Aug 2007)

by Joanna Rutkowska and Alexander Tereshkin

(In-depth BluePill detection and anti-detection)

Presentation slides: PPT, PDF

Code and demos: here

Blog commentary: virtualization detection vs. bluepill detection discussion,

(Refer also to the Bluepilling the Xen Hypervisor presentation above for additional research on this topic.)


Reply via email to