Part 2: Asian Conference on Availability, Reliability and Security (AsiaARES)International audienceIn this paper, we first give a short introduction to the security situation of virtualization technology, and then analyze the implementation challenges of the CPU virtualization component of a hybrid system virtual machine with support of running a guest machine of the IA-32 instruction set. Based on a formal definition of the CPU’s execution state, we propose a fuzzing test case generation technique for both the operands and operators of instructions, which can be applied to fuzz testing the virtual machine monitor (VMM) of a hybrid system virtual machine
A virtual machine monitor (VMM) supports execution of multiple unmodified operating systems in virtu...
Fuzz testing or fuzzing is interface robustness testing by stressing the interface of a system under...
Stealth Malware (Rootkit) is a malicious software used by attack- ers who wish to run their code on ...
Virtual machines offer the ability to partition the resources of a physical system and to create iso...
A CPU emulator is a software that simulates a hardware CPU. Emulators are widely used by computer sc...
A CPU emulator is a software system that simulates a hardware CPU. Emulators are widely used by comp...
Coverage-based greybox fuzzing has strong capabilities in discovering virtualization software vulner...
Over the last few years there has been immense progress in developing powerful security tools based ...
With the growth of virtualization and cloud computing, more and more forensic investigations rely on...
Virtual machines have been used since the 1960’s in creative ways. From multiplexing expensive mainf...
A virtual machine monitor (VMM) allows multiple op-erating systems to run concurrently on virtual ma...
You should by now be aware of everything, cause the topic’s title clearly describes the contents of ...
International audienceVirtualisation and emulation technologies are increasingly used for malware an...
For our project, we propose to investigate the use of virtual machines to inject hardware faults int...
We study the remote detection of virtual machine monitors (VMMs) across the Internet, and devise fuz...
A virtual machine monitor (VMM) supports execution of multiple unmodified operating systems in virtu...
Fuzz testing or fuzzing is interface robustness testing by stressing the interface of a system under...
Stealth Malware (Rootkit) is a malicious software used by attack- ers who wish to run their code on ...
Virtual machines offer the ability to partition the resources of a physical system and to create iso...
A CPU emulator is a software that simulates a hardware CPU. Emulators are widely used by computer sc...
A CPU emulator is a software system that simulates a hardware CPU. Emulators are widely used by comp...
Coverage-based greybox fuzzing has strong capabilities in discovering virtualization software vulner...
Over the last few years there has been immense progress in developing powerful security tools based ...
With the growth of virtualization and cloud computing, more and more forensic investigations rely on...
Virtual machines have been used since the 1960’s in creative ways. From multiplexing expensive mainf...
A virtual machine monitor (VMM) allows multiple op-erating systems to run concurrently on virtual ma...
You should by now be aware of everything, cause the topic’s title clearly describes the contents of ...
International audienceVirtualisation and emulation technologies are increasingly used for malware an...
For our project, we propose to investigate the use of virtual machines to inject hardware faults int...
We study the remote detection of virtual machine monitors (VMMs) across the Internet, and devise fuz...
A virtual machine monitor (VMM) supports execution of multiple unmodified operating systems in virtu...
Fuzz testing or fuzzing is interface robustness testing by stressing the interface of a system under...
Stealth Malware (Rootkit) is a malicious software used by attack- ers who wish to run their code on ...