Isolated User Mode in Windows 10 with Dave Probert

Sign in to queue

Description

This was seriously a treat for me. I had the privilege of spending time with the venerable Dave Probert who has been working on the Windows kernel for a long time. We discussed an interesting security issue which had up to this point never occurred to me - how do we protect ourselves from kernel exploits? The solution he lays out (and actually forms part of Windows 10) is genius and lays the foundation for some truly interesting innovations down the road.

This is part one in a series of 3 videos. Stay tuned for the next installment!

Embed

Download

Download this episode

The Discussion

  • User profile image
    balarav

    He is a GOOD teacher and I am glad you asked him valid questions.  I would love to see a series with Dave teaching "Operating systems". I am really looking forward to the other episodes.

    Good job Dave !!

    Thanks 

     

  • User profile image
    OmariO

    More low levels!

  • User profile image
    bbahes

    I hope you will give this gentlemen more time on Channel 9. Hoping for series on Windows Internals? ;)

  • User profile image
    sjypharm

    Bring on part two - 3,4,5, and 6?? Please!!

  • User profile image
    Mario

    Is it Going Deep show?

  • User profile image
    Tolga42

    Fantastic information. Looking forward to the rest!

  • User profile image
    Charles

    Awesome!

    Welcome back, Dave. Excellent as usual! :)

    Great job, Seth!

    Looking forward to the next installments.

    C

  • User profile image
    IM Patient

    Where is part 2?????????????????????

    This is the best description of I've seen of IUM so far. I wish Microsoft would not send the management/PM types out to conferences, please just send the engineers to give the correct description to begin with!

    PARRRTTT TWWWOOOOOOO!!!!!

  • User profile image
    danielts

    Nice info! Looking forwards for the next video.

  • User profile image
    suhuy

    Thank you for this video. That was very interesting.
    I think IUM will be used for Windows Docker containers.
    Docker on Linux uses similar kernel instructions to isolate the containers.

  • User profile image
    maniac00

    this is great. Looking forward for the next one. Love to see more videos from this man. 

  • User profile image
    Ali M Rouhi

    More Dave Probert videos. Why not doing a series that teach us people more about Windows 10 Kernel stuff? It would be awesome and appreciated.

  • User profile image
    SomeRandom​Dude

    ONLY 30 MINS??!?!?!?!?!
    loved it!!!

    can't wait for part 2!

    Thanks a lot!

  • User profile image
    Hassan G

    this is the best explanation that i have seen in Channel9, it is possible the others use this metodolegie (Black Board) instead of Tablet

  • User profile image
    hchintapalli

    Thanks for the deep down explanation.

  • User profile image
    Martin

    Excellent, after wasting many hours on MS Academy W10 series, this video is exceptional and tells the story from the bottom up, not top down as were expected to understand (and I never can), you both work very well together.

  • User profile image
    Ali M Rouhi

    Is the marshalling act performed by the proxy Kernel the same as the mechanism called LPC which was mentioned in Helen Custer's Inside Windows NT book?

  • User profile image
    Julien Couvreur

    For those pressed for time, the short of this video is that the kernel team introduced the concept of secure kernel which is used by some secure application.
    Both the secure kernel and secure application run in a different address space from the normal kernel and normal applications. This address space is managed and isolated by the hypervisor's "Virtual Secure Mode" feature (which is a form of address translation in the hypervisor). The secure kernel is not a full-fledged kernel, but rather a mediator/proxy for system calls to the kernel (via some shared memory).
    The result is that the kernel does not have access to the in-memory data of the secure application.

    This video did not explain how an application developer can run his application in this secure mode. This is presumably the topic of the next video.

  • User profile image
    BrianHartung

    Seth, you have an uncanny ability to ask the follow-up question I was just thinking.  And while that might not be particularly impressive from my wife's point of view, I certainly appreciate it.

  • User profile image
    timreilly

    Are these in order?

    Part 1: Isolated User Mode (This Video)

    Part 2: Isolated User Mode Processes and Features 

    Part 3: More on Process and Features

     

    Really enjoying these videos!

    Thank you for sharing!

  • User profile image
    ryan

    so this is basically Microsoft's implementation of Jail from Linux?

  • User profile image
    Nico


    I am deaf, where can I find the text version ?

  • User profile image
    NKM

    Awesome... Nice explanation..

    -Nambi

Add Your 2 Cents