Windows 10 Virtual Secure Mode with David Hepkin

Sign in to queue

Description

In this video I spent some time with David Hepkin, a member of the Windows engineering team working on Hyper-V, to get a better understanding of the Windows 10 Virtual Secure Mode. I've had the good fortune of learning a lot about Isolated User Mode with several folks in the kernel team. In this installment David describes how virtualization is helping facilitate these new features and describes how the hypervisor even helps protect against illegal memory access from rogue devices and drivers. 

Tags:

Kernel, Windows

Embed

Download

Download this episode

The Discussion

  • User profile image
    Arne

    How modern does the hardware need to be for this security to work?
    On what SKU of windows 10 does it work?

  • User profile image
    ManuRautela

    do we have a high quality version of the video?

    great going guys, keep uploading more on this low level stuff :)

  • User profile image
    Jason Fossen

    Great video!! More videos about future plans for Virtual Secure Mode apps please, e.g., host-based IPS agents, Bromium plug-ins, Windows licensing activation, encryption oracles, CNG key managers, Credential Manager app, Microsoft Wallet app for credit card numbers, Intel SGX integration, stealthy monitoring agents for law enforcement, DRM enforcement, VSM rootkits, etc.

    Also, please talk about the red team work you've done or hired to look for hypervisor attack vulnerabilities, e.g., VMBus fuzzing, corrupting the SLAT entries, getting around the IOMMU, etc.

    Thanks!!

  • User profile image
    Karunamoort​hy

    Thank you very much for the detail coverage on Windows 10 Virtual Secure Mode.

Add Your 2 Cents