Windows 10 Virtual Secure Mode with David Hepkin

Download this episode

Download Video


In this video I spent some time with David Hepkin, a member of the Windows engineering team working on Hyper-V, to get a better understanding of the Windows 10 Virtual Secure Mode. I've had the good fortune of learning a lot about Isolated User Mode with several folks in the kernel team. In this installment David describes how virtualization is helping facilitate these new features and describes how the hypervisor even helps protect against illegal memory access from rogue devices and drivers. 


Kernel, Windows



Available formats for this video:

Actual format may change based on video formats available and browser capability.

    The Discussion

    • User profile image

      How modern does the hardware need to be for this security to work?
      On what SKU of windows 10 does it work?

    • User profile image

      do we have a high quality version of the video?

      great going guys, keep uploading more on this low level stuff :)

    • User profile image
      Jason Fossen

      Great video!! More videos about future plans for Virtual Secure Mode apps please, e.g., host-based IPS agents, Bromium plug-ins, Windows licensing activation, encryption oracles, CNG key managers, Credential Manager app, Microsoft Wallet app for credit card numbers, Intel SGX integration, stealthy monitoring agents for law enforcement, DRM enforcement, VSM rootkits, etc.

      Also, please talk about the red team work you've done or hired to look for hypervisor attack vulnerabilities, e.g., VMBus fuzzing, corrupting the SLAT entries, getting around the IOMMU, etc.


    • User profile image

      Thank you very much for the detail coverage on Windows 10 Virtual Secure Mode.

    Comments closed

    Comments have been closed since this content was published more than 30 days ago, but if you'd like to send us feedback you can Contact Us.