Virtual machine introspection, a technique for observing the runtime state between virtual machines, emerged as a useful security tool in 2003. However, much work had to be done before the technique could be used for building viable applications. This talk looks at many of the advances made related to virtual machine introspection in the past six years including the open source XenAccess Library, techniques for performing runtime memory analysis, and interesting security applications. It concludes with a discussion of the feasibility of deploying an introspection-based security architecture on desktop systems.