This document discusses techniques for stealthy malware analysis using hypervisor-based monitoring. It describes how debuggers can be detected by malware and introduces using a hypervisor like Xen to monitor guest VMs in a more stealthy way. It covers using features like alternate page tables (altp2m) to improve stealth when single-stepping or handling events from multiple VCPUs. Challenges of porting these techniques to ARM and hiding from techniques malware uses to detect debugging and virtualization are also discussed.