15.08.2015 Views

Attacking Hypervisors via Firmware and Hardware

nd5ln5n

nd5ln5n

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VMM “forensics”With the help of a rootkit in firmware any VM guestcan extract all information about hypervisor <strong>and</strong> otherVMs … <strong>and</strong> just from memory• VMCS structures, MSR <strong>and</strong> I/O bitmaps for each VM guest• EPT for each VM guest• Regular page tables for hypervisor <strong>and</strong> each VM guest• IOMMU pages tables for each IOMMU device• Full hypervisor memory map, VM exit h<strong>and</strong>ler…• Real hardware configuration (registers for real PCIe devices,MMIO contents…)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!