Hypervisor-Based, Hardware-Assisted System Monitoring

Provided by: SecurityTube.net
Topic: Hardware
Format: Podcast
In the last few years, many different techniques have been introduced to analyses malicious binary executables. Most of these techniques take advantage of Virtual Machine Introspection (VMI), the process of analyzing the state of a virtual machine from the outside.

Find By Topic