Giter Site home page Giter Site logo

virtulization-security's Introduction

Virtulization-Security

Some interesting papers & projects

Papers

1. VDF (RAID 2017)

VDF is a targeted evolutionary fuzzing framework for discovering bugs within the software-based virtual devices implemented as part of a hypervisor, which selectively instruments the code of a given virtual device, and performs record and replay of memory-mapped I/O (MMIO) activity specific to the virtual device.

2. Hyper-Cube (NDSS 2020)

Hyper-Cube is a fuzzer that aims explicitly at testing hypervisors in an efficient, effective, and precise way, which is based on a custom operating system that implements a custom bytecode interpreter.

3. NYX (USENIX 2021)

NYX is a highly optimized, coverage-guided hypervisor fuzzer, whose fast snapshot restoration mechanism can reload the system under test thousands of times per second is key to performance. NYX's mutation engine based on custom bytecode programs, encoded as directed acyclic graphs (DAG), and affine types, that enables the required flexibility to express complex interactions.

4. V-Shuttle (CCS 2021)

V-Shuttle is a hypervisor fuzzing framework aiming the vitual device, whose DMA redirection mechanism and the fuzzing mutation scheduling mechanism make fuzzing scalable and semantics-aware.

5. Morphuzz (USENIX 2022)

Morphuzz is a generic approach that leverages insights about hypervisor design combined with coverage-guided fuzzing to find bugs in virtual device implementations.

6. MundoFuzz (USENIX 2022)

Mundofuzz develops a statistical differential coverage measurement methods to capture the clean coverage information for hypervisor inputs and learns the input grammar through inspecting the coverage characteristics of the given hypervisor inputs.

7. Hyperfuzzer (CCS 2021)

Hyperfuzzer develops hybrid fuzzer towards Virtual CPU, which based on Hyper-V. HyperFuzzer leverages Intel-PT to record the control flow of hypervisor, and introduces a novel technique called Nimble Symbolic Execution which relies on the only control flow trace and the fuzzing input to perform symbolic execution. Hyperfuzzer also use unrealated constraint elimination and bit-wise symbolic variebles to get high efficiency.

virtulization-security's People

Contributors

chan9yan9 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.