Interesting site, it describes commonly used tactics to subvert virtual machines.
https://evasions.checkpoint.com/