Twitter | Pretraživanje | |
Daax Rynd
Analyzed with and offered improvements to BattlEye's VM detection. It was surprising this was their only method to detect generic hypervisors.
Reply Retweet Označi sa "sviđa mi se" More
Daax Rynd 14. sij
Odgovor korisniku/ci @vm_call
Seems that there are two others found after more thorough analysis. Using xgetbv/xsetbv in a loop similar to the one in the article. XSETBV is an unconditionally exiting instruction so naturally it fits for the time based attack. 1/2
Reply Retweet Označi sa "sviđa mi se"
Daax Rynd 14. sij
Odgovor korisniku/ci @vm_call
The other is using CPUID where EAX=0 to query CPU vendor information. For whatever reason, they loop these an exorbitant amount of times - 26,000 times. The rest of the code is virtualized with VMP - yikes. The perf overhead is extreme.
Reply Retweet Označi sa "sviđa mi se"