Another security-related risk is known as “hyper jacking”, in which an attacker crafts and then runs an ultrathin hypervisor that takes complete control of the underlying operating system. A good example of how this risk might present itself is the Blue Pill root-kit (Kernel level attacks) developed by security researcher Joanna Rutkowska. A root-kit is a Trojan program destined to hide all evidence of its existence from system administrators and others who look for anomalies and security breaches in systems. The Blue Pill root-kit bypasses the Vista integrity-checking process for loading unsigned code into the Vista operating system’s kernel. This code uses AMD’s secure VM, designed to boost security, to masquerade itself from detection, and becomes a hypervisor, taking control of the operating system [13].