Completed
ARCHITECTURAL LAYER OVERVIEW
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Battle of the SKM and IUM - How Windows 10 Rewrites OS Architecture
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 PRESENTATION OVERVIEW
- 3 THREE KEY VBS FEATURES BEING INTRODUCED
- 4 HOW DOES IT ALL WORK?
- 5 SEPARATION OF POWERS
- 6 ARCHITECTURAL LAYER OVERVIEW
- 7 PLATFORM REQUIREMENTS
- 8 HYPERVISOR-BASED CODE INTEGRITY (HVO)
- 9 HARD CODE GUARANTEES
- 10 VOCABULARY REVIEW
- 11 VSM / HYPERVISOR LAUNCH
- 12 SKM LAUNCH
- 13 BOOT VSM POLICY
- 14 BCD VSM POUCY OPTIONS
- 15 HYPERVISOR MSR FILTERING AND NX MMIO
- 16 SKM FUNCTION LAYOUT
- 17 SKM STRUCTURES
- 18 MAILBOXES
- 19 SKM CAPABILITIES
- 20 STORAGE BLORS
- 21 SECURE MODE CALLS
- 22 SECURE MODE SERVICE CALLS
- 23 SPECIALIZED SECURE MORE SERVICE CALLS
- 24 NORMAL MODE CALLS
- 25 NORMAL MODE SERVICE CALLS
- 26 UEFI RUNTIME CALLS
- 27 CORE IUM-EXPOSED SKM SERVICES
- 28 SECURE SYSTEM CALLS
- 29 CRYPTO SUBCALLS
- 30 SECURE BASE API
- 31 IUM SYSTEM CALLS
- 32 IUM SYSTEM CALL SECURITY
- 33 NORMAL MODE SYSTEM CALL PROKYING
- 34 LAUNCHING A TRUSTLET
- 35 TRUSTLET CRYPTOGRAPHIC REQUIREMENTS
- 36 TRUSTLET INSTANCE GUID
- 37 VIRTUAL MACHINE SECURE WORKER PROCESS
- 38 LOADING A TRUSTLET
- 39 FAKE BASE SERVER CONNECTION
- 40 TRUSTLET TO NORMAL WORLD COMMUNICATIONS
- 41 TRUSTLET ALPC ENDPOINT CONNECTIONS
- 42 CAN WE BUILD OUR OWN TRUSTLETS?
- 43 SECURE KERNEL COMPLEXITY / ATTACK SURFACE
- 44 COMPROMISING VBS / MISUSING VSM
- 45 VSM WITHOUT SECUREBOOT
- 46 RECOMMENDATIONS
- 47 YOU HAVE QUESTIONS?