This document discusses virtual machine introspection using the Xen hypervisor. It describes how Xen provides isolation between guest VMs and the hypervisor domain (dom0). It also discusses how Xen security modules can be used to move introspection systems out of dom0. The document then covers how to interpret guest VM state using memory forensics techniques and the LibVMI library. It explains how to use EPT and ARM page table permissions to intercept events in the guest VM and forward them to the hypervisor for processing.