http://invisiblethingslab.com/itl/Resources.html Firmware/CPU/Chipset security (2009) Attacking Intel® Trusted
Execution Technology (Black Hat DC, Feb 2009) by Rafal Wojtczuk and
Joanna Rutkowska Press releases: Announcement PR (PDF), Post-conference PR (PDF) Blog commentary: announcement Paper & Slides: Paper (PDF), Slides (PDF), Slides (Keynote), Slides (MOV) Code: [to be published once Intel patches the firmware] Security Challenges in Virtualized Environments (RSA Conference, Apr
2008) by Joanna Rutkowska (presents nested virtualization on AMD-v) Code and demos: here Blog commentary: nested virtualization IsGameOver(), anyone? (Black
Hat USA, Aug 2007) by Joanna Rutkowska and Alexander Tereshkin (In-depth BluePill detection and anti-detection) Code and demos: here Blog commentary: virtualization detection vs. bluepill detection
discussion, (Refer also to the Bluepilling the Xen Hypervisor presentation above for additional research on this topic.) |