my areas of interests as a researcher cross the direction with persistent threats evolution: ring3->ring0->ring -1(hypervisor)->ring -2(BIOS/FW)->[hardware]. When we increase the level of mitigations on the higher levels of the stack it only motivates the attacker to move down.
-
-
because more detailed and realistic picture doesn't fit one twitter message ;)
-
IIRC this term was mentioned first time by Tereshkin and
@rootkovska about 10 yrs ago. As I understand, it is a formal metric that was appeared with hypervisor meaning a higher level of privileges through of which an attacker can bypass existing security boundaries.
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.