Session

Malware detection... with type-1 hypervisors

In this presentation, I will be be going through an explanation of how type-1 hypervisors work - more specifically Intel VT-X - and demo of a type-1 hypervisor (using HyperDbg) that will transparently stop an application from writing to memory (simulating malicious patching) and adulterating cpuid to trick applications into thinking they are running in a different environment.

André Lima

Telenor CyberDefence, Red Team Leader

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top