Back to Results
First PageMeta Content
X86 architecture / IBM PC compatibles / Hardware virtualization / X86 virtualization / IOMMU / Trusted Execution Technology / DMA attack / MOV / Southbridge / System software / Computer hardware / Computing


Another Way to Circumvent IntelĀ® Trusted Execution Technology Tricking SENTER into misconfiguring VT-d via SINIT bug exploitation Rafal Wojtczuk Joanna Rutkowska
Add to Reading List

Document Date: 2009-12-21 13:05:46


Open Document

File Size: 332,91 KB

Share Result on Facebook
UPDATE