[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Qemu-devel] Google SoC 2015 Idea - Extracting Virtual Device Implementa

From: Guodong Zhu
Subject: [Qemu-devel] Google SoC 2015 Idea - Extracting Virtual Device Implementation from QEMU
Date: Tue, 17 Mar 2015 15:38:45 -0400


I'm currently a Ph.D. student of the University of Georgia. My area of interest is virtualization and security.

The security vulnerabilities of the virtual devices of QEMU are usually hard to find because generating specific inputs that can trigger the vulnerabilities for a vulnerable virtual device are not easy in given the device is running in the whole QEMU environment, and also some of the vulnerabilities can lead to undefined behavior instead of crashing the execution of the virtual device and QEMU, which makes them harder to detect.

The idea of extracting virtual device implementation comes from the observation that dynamic analysis and symbolic execution techniques brings a lot of advantages to software testing and debugging, especially in locating vulnerabilities, but with the large code base of QEMU, it is not easy to apply these techniques when testing some specific code implementation or performing regression tests.

The purpose of the project is to implement an interface that can extract the implementation of the virtual devices and make them executable outside of the QEMU environment, which will benefit later testing and making the test of the virtual devices more flexible and more thoroughly.

Guodong Zhu

reply via email to

[Prev in Thread] Current Thread [Next in Thread]