A Deep Dive Analysis of Microsoft’s Kernel Virtual Address Shadow Feature

January 25, 2018

One of the key features of Microsoft‘s patches is the “Kernel Virtual Address Shadow” (a term coined by Microsoft), or KVAS for short. This feature effectively blocks the Meltdown attack, as it leaves very little kernel memory accessible to user mode code. In this blog post we provide a deep dive analysis of this feature.

Read more...

Previous Article
IoT Botnet: More Targets in Okiru's Cross-hairs
IoT Botnet: More Targets in Okiru's Cross-hairs

The first Okiru sample appeared around October 2017 ,and FortiGuard Labs created a write up of its developm...

Next Article
Unified Threat Management for Higher Education
Unified Threat Management for Higher Education

Higher education is embracing new technology and open networks to foster student innovation. Learn how unif...