<p>Pete Markowsky has been involved with information security and application development since first working with Northeastern University in 2001. He has worked all over the security industry from .edu to .mil to .com in roles such as development, QA, Security Engineer, Risk Analyst and Security Researcher. Pete is currently supporting Crucial Security / Harris in a number of security research and development projects, including two SBIR efforts involving the implementation of a code slicing engine and hypervisor based process isolation.</p>
Ring -1 vs. Ring -2: Containerizing Malicious SMM Interupt Handlers on AMD-V