Interview with Blue Pill creator: Security Threats 3 Levels Beyond Kernel Rootkits
Rutkowska is known for writing Blue Pill to demonstrate how…
“…hardware virtualization technology can be abused by malware to create a stealthy hypervisor and move, on the fly, the running OS into a virtual machine, controlled by this stealthy hypervisor.”
This is a link blog contributed to by Charris, Estraye, Nelg, Thomas and Xuenay.
Copyright ©2010, omglog. Some rights reserved. Keep your children away from Wordpress.