You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
*_Software compartmentalization vs. physical separation_, 2014, [paper](http://www.invisiblethingslab.com/resources/2014/Software_compartmentalization_vs_physical_separation.pdf)
15
-
*_Converting untrusted PDFs into trusted ones: The Qubes Way_, 2013, [post](http://blog.invisiblethings.org/2013/02/21/converting-untrusted-pdfs-into-trusted.html)
16
-
*_Playing with Qubes Networking for Fun and Profit_, 2011, [post](http://blog.invisiblethings.org/2011/09/28/playing-with-qubes-networking-for-fun.html)
*_Exploring new lands on Intel CPUs (SINIT code execution hijacking)_, 2011, [post](http://blog.invisiblethings.org/2011/12/06/exploring-new-lands-on-intel-cpus-sinit.html), [paper](http://www.invisiblethingslab.com/resources/2011/Attacking_Intel_TXT_via_SINIT_hijacking.pdf)
29
-
*_Following the White Rabbit: Software Attacks Against Intel VT-d_, 2011, [paper](http://blog.invisiblethings.org/2011/05/13/following-white-rabbit-software-attacks.html)
30
-
*_Another Way to Circumvent Intel® Trusted Execution Technology_, 2009, [paper](http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf)
31
-
*_Virtualization (In)Security Traning at Black Hat_, 2009, [agenda](http://invisiblethingslab.com/resources/training_virtsec/VirtSecTraining-Agenda-0.9.pdf)
*_Bluepilling the Xen Hypervisor_, 2008, [slides](http://invisiblethingslab.com/resources/bh08/part3.pdf), [post](http://blog.invisiblethings.org/2008/08/08/our-xen-0wning-trilogy-highlights.html)
34
-
*_Detecting & Preventing the Xen Hypervisor Subversions_, 2008, [slides](http://invisiblethingslab.com/resources/bh08/part2-full.pdf)[post](http://blog.invisiblethings.org/2008/08/08/our-xen-0wning-trilogy-highlights.html)
35
-
*_Security Challenges in Virtualized Environments_, 2008, [slides](http://www.invisiblethingslab.com/resources/rsa08/Security%20Challanges%20in%20Virtualized%20Enviroments%20-%20RSA2008.pdf)
28
+
*Exploring new lands on Intel CPUs (SINIT code execution hijacking), 2011, [post](http://blog.invisiblethings.org/2011/12/06/exploring-new-lands-on-intel-cpus-sinit.html), [paper](http://www.invisiblethingslab.com/resources/2011/AttackingIntelTXTviaSINIThijacking.pdf)
29
+
*Following the White Rabbit: Software Attacks Against Intel VT-d, 2011, [paper](http://blog.invisiblethings.org/2011/05/13/following-white-rabbit-software-attacks.html)
30
+
*Another Way to Circumvent Intel® Trusted Execution Technology, 2009, [paper](http://invisiblethingslab.com/resources/misc09/Another%20TXT%20Attack.pdf)
31
+
*Virtualization (In)Security Traning at Black Hat, 2009, [agenda](http://invisiblethingslab.com/resources/trainingvirtsec/VirtSecTraining-Agenda-0.9.pdf)
*_Subverting Vista Kernel for Fun and Profit (incl. introduction of Blue Pill)_, [post](http://blog.invisiblethings.org/2006/06/22/introducing-blue-pill.html), [slides](http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf)
*Subverting Vista Kernel for Fun and Profit (incl. introduction of Blue Pill), [post](http://blog.invisiblethings.org/2006/06/22/introducing-blue-pill.html), [slides](http://www.blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf)
0 commit comments