2020 IEEE 20th International Conference on Software Quality, Reliability and Security (QRS) 2020
DOI: 10.1109/qrs51102.2020.00036
|View full text |Cite
|
Sign up to set email alerts
|

Non-intrusive Virtual Machine Analysis and Reverse Debugging with SWAT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0
1

Year Published

2022
2022
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 11 publications
0
1
0
1
Order By: Relevance
“…For the Full-system emulation of QEMU, Zhang et al detail in [36] a partial list of implementation gaps, such as General Protection exceptions not being raised as in hardware upon, e.g., accessing a reserved MSR register. Recently, Dovgalyuk et al in [12] report on incorrect FPU context information in QEMU, using the detection that D'Elia et al [9] wrote for Pin.…”
Section: Discussionmentioning
confidence: 99%
“…For the Full-system emulation of QEMU, Zhang et al detail in [36] a partial list of implementation gaps, such as General Protection exceptions not being raised as in hardware upon, e.g., accessing a reserved MSR register. Recently, Dovgalyuk et al in [12] report on incorrect FPU context information in QEMU, using the detection that D'Elia et al [9] wrote for Pin.…”
Section: Discussionmentioning
confidence: 99%
“…Наш подход к интроспекции основан на перехвате редко меняющихся событий (системные вызовы) и анализе ядерных структур данных в памяти виртуальной машины. Интерфейс системных вызовов меняется в рамках существующей системы очень редко [12]. Обычно только добавляются новые варианты функций или старые перестают использоваться.…”
Section: поиск поверхности атакиunclassified