Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore virtualization system vulnerability discovery technology in this 42-minute conference talk from SyScan360'16 Singapore. Delve into the intricacies of hypervisor distinctions and cloud computing attack processes. Examine the unique attack surface of virtualized environments compared to traditional targets. Learn methods for testing hardware virtual components and understand the structure and workflow of fuzz frameworks. Discover advanced monitoring skills and gain insights into device emulator exceptions. Analyze the E1000 network device vulnerability and explore QEMU-KVM escape technology. Gain valuable knowledge about identifying and exploiting vulnerabilities in virtualization systems, essential for cybersecurity professionals and researchers in the field of cloud computing security.
Syllabus
Intro
360 Marvel Team
Hypervisor
Distinctions
Attacking Processes in cloud computing
The attack surface
Basic Intro
Compare to traditional targets
Methods for testing hardware virtual components
Fuzz framework structure
Fuzz framework working flow (part 1)
Functions of controlling
Testing data attacks
Exceptions occur in device emulator
Advanced monitoring skills
Principle of 1000 Network Device
E1000 vulnerability analysis
About gemu-kvm escape technology
Taught by
SyScan360