Posted September 11, 20195 yr FPCH Admin In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, “First Steps in Hyper-V Research”, describes the tools and setup for debugging the hypervisor and examines the interesting attack surfaces of the virtualization stack components. We then published “Fuzzing para-virtualized devices in Hyper-V”, which has been the focus of our friends at the Virtualization Security Team. Another Forum - Unlike the Rest
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.