Hypervisor-Based, Hardware-Assisted System Monitoring

In the last few years, many different techniques have been introduced to analyses malicious binary executables. Most of these techniques take advantage of Virtual Machine Introspection (VMI), the process of analyzing the state of a virtual machine from the outside.

Provided by: SecurityTube.net Topic: Hardware Date Added: Oct 2013 Format: Podcast

Find By Topic