An excerpt:
Whereas VMware uses a special port to perform guest-tohost
and host-to-guest communication, VirtualPC relies on the
execution of illegal opcodes to raise exceptions that the kernel
will catch. This method is very similar to the illegal opcode
execution that Windows NT and later operating systems use in
their DOS box to communicate with the operating system. By
reverse-engineering the VirtualPC executable file, the author
of this paper found that the opcodes are the following
Peter Ferrie is a Sr. Researcher @ Symantec. Check out his site as well, you'd wanna download this interesting article.
Comments
Post a Comment