Главная
Study mode:
on
1
Welcome
2
Device Virtualization
3
Architecture
4
Shared Memory
5
Security
6
Research Goal
7
History
8
Example
9
Box
10
Windows kernel
11
Memory Access Tracing
12
Trace Collector
13
ZeroTrace
14
DoubleFetch
15
Advantages and Limitations
16
Nested Virtualization
17
KVM
18
QM
19
Blockback
20
PCI Pack
21
Exploit
22
Indirect Jump
23
Mutex Lock
24
Mutex Beta Structure
25
Memory Layout
26
Global Data
27
Formats
28
Code Execution
29
Demo
30
Final slides
Description:
Explore a comprehensive Black Hat conference talk on breaking paravirtualized devices in hypervisors. Delve into Felix Wilhelm's research on the security of backend components and learn about Xenpwn, a hypervisor-based memory access tracing tool. Discover critical vulnerabilities in Xen hypervisor's paravirtualized drivers, and gain insights into virtualization security, race conditions, and compiler optimization-induced vulnerabilities. Examine topics such as device virtualization architecture, shared memory security, memory access tracing techniques, and nested virtualization. Analyze real-world examples, including Windows kernel exploits, and understand the advantages and limitations of various approaches. Witness a live demonstration and grasp complex concepts like indirect jumps, mutex locks, and memory layouts in hypervisor security.

Xenpwn - Breaking Paravirtualized Devices

Black Hat
Add to list