Hypervisor-Based, Hardware-Assisted System Monitoring

Listen Now
Provided by: SecurityTube.net
Topic: Hardware
Format: Podcast
In the last few years, many different techniques have been introduced to analyses malicious binary executables. Most of these techniques take advantage of Virtual Machine Introspection (VMI), the process of analyzing the state of a virtual machine from the outside.
Listen Now

Find By Topic