In the last part of this […]| hn security
The first implementation heavy article covering the details of x86 paging, MTRR configuration, VPID/PCID, and initializing an EPT hierarchy.| Reverse Engineering