<style type="text/css">p { margin-bottom: 0.08in; }</style>
<p style="margin-bottom: 0in;">Dear Bitvisor developers,<br><br>As
stated in the first Bitvisor paper, Bitvisor uses Int0x15 for
protecting its memory from guest OS. However, there are manual way of
probing memory map instead of using BIOS int0x15, which are not
recommended but still can be used.</p>
<p style="margin-bottom: 0in;">Assume a guest OS which contains a
rootkit for detection and destruction of Bitvisor. It can guess the
memory area of Bitvisor by using int0x15 results during Bitvisor
presence and absence in the same system, and then it can use manual ways of memory
access (without using int0x15) for destruction of the hypervisor in memory.<br>Can
Bitvisor protect itself against such attacks?</p><p style="margin-bottom: 0in;">Best Regards,</p><p style="margin-bottom: 0in;"><br></p>
<p style="margin-bottom: 0in;"><br>
</p>