📜 ⬆️ ⬇️

We are starting a series of posts devoted to the works of the winners of InfoTeKS Academy 2011-2012 in the direction of "Scientific Research"

We are starting a series of posts dedicated to the works of the winners of InfoTeKS Academy 2011-2012 in the direction of "Scientific Research", we hope that our notes will become a real source of inspiration for you and help you to win.

Today we will tell about the study of the team from St. Petersburg under the leadership of Anton Sergeyev, aimed at checking the possibility of hidden virtualization of the user operating system and transfer it to guest status.

As a result of a research attack, the system can be under complete control from an external hidden hypervisor, and it is extremely difficult to notice the fact of an attack: the presence of virtualization acceleration hardware on a PC makes the work of hypervisors extremely effective. The speed of loading and operation of a “clean” operating system after virtualization differs slightly. And this is already in the basic version of the hypervisor, without any optimization of internal processes!
')
As a proof-of-concept option, the virtualization of the Ubuntu 13.04 operating system was performed.

The results are presented in the form of a video .

Source: https://habr.com/ru/post/214237/


All Articles