Posted on Wednesday September 11, 2019
In the past year we invested a lot of time making Hyper-V research more accessible to everyone. Our first blog post, “First Steps in Hyper-V Researchâ€, describes the tools and setup for debugging the hypervisor and examines the interesting attack surfaces of the virtualization stack components. We then published “Fuzzing para-virtualized devices in Hyper-Vâ€, which …
Attacking the VM Worker Process Read More »
The post Attacking the VM Worker Process appeared first on Microsoft Security Response Center.