Completed
Indirect Jump
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Xenpwn - Breaking Paravirtualized Devices
Automatically move to the next video in the Classroom when playback concludes
- 1 Welcome
- 2 Device Virtualization
- 3 Architecture
- 4 Shared Memory
- 5 Security
- 6 Research Goal
- 7 History
- 8 Example
- 9 Box
- 10 Windows kernel
- 11 Memory Access Tracing
- 12 Trace Collector
- 13 ZeroTrace
- 14 DoubleFetch
- 15 Advantages and Limitations
- 16 Nested Virtualization
- 17 KVM
- 18 QM
- 19 Blockback
- 20 PCI Pack
- 21 Exploit
- 22 Indirect Jump
- 23 Mutex Lock
- 24 Mutex Beta Structure
- 25 Memory Layout
- 26 Global Data
- 27 Formats
- 28 Code Execution
- 29 Demo
- 30 Final slides