1
Speaker: Qinghao Tang
Title:360 Marvel Team Leader
Virtualization Device
Emulator Testing Technology
2
360 Marvel Team
Established in May 2015, the first professional could
computing and virtualization security team in China.
Focusing on attack and defense techniques in virtualization
system.
● fuzzing framework
● guest machine escape technology
● Hypervisor risk defense technology
3
Agenda
•  Virtualization System Attack Surface
•  Fuzzing framework
•  Case study
4
Virtualization System Attack Surface
5
Cloud Computing
6
Hypervisor
Types
Xen Kvm Vmware
function
quantizing
distribution
flexible
scheduling
7
Distinctions
OS
Physical Devices
Guest OS
Hardware
emulator
Hypervisor
Physical Devices
Guest OS
Hardware
emulator
Normal Server Virtualization Server
8
Attacking Processes in cloud computing
1.  Enter VM via web or other devices
2.  Exploit virtualization system vulnerabilities to escape VM
3.  lateral movements to others VMs on host
4.  Access to host network
9
Operation Principles of device emulators
10
The attack surface
•  Hardware virtualization components’ diversity
Qemu: 30+
Vmware:20+
•  Bridge between inside-outside
VM os -> device emulators -> Host os
•  Related Vulnerabilities result big dangers
•  Limitation
11
Fuzzing Framework
12
Basic intro
Attack surface : hardware virtual components
Environment : qemu , vmware
Testing results : more than 20 vulnerabilities
Challenges : lower layers hard to predict;
Trends
•  more attack surfaces
•  more kinds of virtualization systems
13
•  Hardware virtualization focus on lower layers
•  Testing data totally different
Compare to traditional targets
System Kernel
Hypervisor
14
1. Analyze data which flowed to components
2. Change flowed-in data’s contents and timing
3. Recording all of tiny abnormal activities
4. Analyze abnormal activities, takes and optimize fuzz
framework.
Methods for testing hardware virtual components
15
Other factors of fuzz framework
1.Flexibility (other OS)
•  vm in Linux
•  coding in C and Python
2. Deeply understand VM system
•  language for coding
•  development environment
•  coding style
16
os
Control Center
Fuzz framework structure
HostHost
os os os osos
17
Fuzz framework working flow (part 1)
1. Set up network and hardware environment, launch server, client
and monitor.
2. Load system hook module, get all of machines’ device emulators
3. Client ask server for testing data of emulators, server send out
required data.
4. Client received and loaded testing data, launch test.
5. Monitor continually monitor hypervisor, and record logs.
18
Fuzz framework working flow (part 2)
6. Notify the server after client testing finished
7. Server get logs from client and monitor, save it.
8. Server launch log analyze module, determine if anything
wrong happened, and notify admins.
9. Analyze program exceptions, optimize fuzz framework
19
Functions of controlling center
20
Get target components info
21
•  Device access ports
•  Device deal with structures used by data.
•  Device data processing
Testing data
•  User space: generate testing dat,
send request to client kernel
•  Kernel space: apply for memory, fill
memory, send info to ports
•  Device emulator:testing data flow
inside,trigger exceptions
22
Testing data attacks
user space
Kernel space
Device controller
23
Monitor
VM management
•  Snapshot
•  Reboot
•  VM device editing
Dynamic debugging
•  Debugging Mode on Start
•  Load Debugging Plugin
VM processing log
•  User space
•  Kernel space
24
Exceptions occur in device emulator
•  VM os crash
•  Hypervisor crash
•  Invisible results
25
Advanced monitoring skills
•  Dynamic
•  Static
26
Optimize fuzz framework by using log data
•  Client log
Decrease invalid combinations
•  Monitor log
Promote coverage
•  Server log
27
Vulnerabilities found by us
28
Case Study
29
• Initialization
Port Allocation , Address Mapping
Device Status Setting, Resource Allocation
• Data Transfer
'Write Command' to device TDT register
process of descriptor
3 types descriptor : context , data , legacy
data xfer
set status , wait for next instruction
• Processing Details
Circular Memory
TSO : tcp segmentation/flow control.
Principle of e1000 Network Device
30
•  Qemu e1000 Network Device
•  Vmware e1000 Network Device
E1000 vulnerability analysis
31
Pcnet network card emulator working processes
Io port write
Control and
Status
Registers
write
Receive Send
Virtual Network Interface
32
•  Qemu pcnet Network Device
Pcnet vulnerability analysis
33
Summary
Stay tuned for more achievements by
360 Marvel Team
34
Q & A	
Email:tangqinghao@360.cn
QQ:702108451

More Related Content

PDF
Csw2016 d antoine_automatic_exploitgeneration
PDF
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
PDF
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
PDF
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
PDF
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
PPTX
BlueHat v17 || Securing Windows Defender Application Guard
PDF
Endpoint is not enough
PDF
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
Csw2016 d antoine_automatic_exploitgeneration
CSW2017 Weston miller csw17_mitigating_native_remote_code_execution
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
50 Shades of Fuzzing by Peter Hlavaty & Marco Grassi
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
BlueHat v17 || Securing Windows Defender Application Guard
Endpoint is not enough
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...

What's hot (20)

PPTX
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
PDF
Windows Systems & Code Signing Protection by Paul Rascagneres
PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PPTX
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
PDF
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
PPTX
Современные технологии и инструменты анализа вредоносного ПО_PHDays_2017_Pisk...
PDF
Defcon 27 - Writing custom backdoor payloads with C#
PDF
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
ODP
Tracking vulnerable JARs
PPTX
Not a Security Boundary: Bypassing User Account Control
PDF
Csw2016 macaulay eh_trace-rop_hooks
PDF
0day hunting a.k.a. The story of a proper CPE test
PPTX
Virtual Machine Introspection - Future of the Cloud
PPTX
How to drive a malware analyst crazy
PDF
Bsides NYC 2018 - Hunting for Lateral Movement
PPTX
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
PPTX
Bridging the Gap: Lessons in Adversarial Tradecraft
PDF
Continuous intrusion: Why CI tools are an attacker’s best friends
PDF
BlueHat v18 || Memory resident implants - code injection is alive and well
PDF
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
BlueHat v17 || Mitigations for the Masses: From EMET to Windows Defender Exp...
Windows Systems & Code Signing Protection by Paul Rascagneres
CSW2017 Geshev+Miller logic bug hunting in chrome on android
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
CSW2017 Enrico branca What if encrypted communications are not as secure as w...
Современные технологии и инструменты анализа вредоносного ПО_PHDays_2017_Pisk...
Defcon 27 - Writing custom backdoor payloads with C#
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
Tracking vulnerable JARs
Not a Security Boundary: Bypassing User Account Control
Csw2016 macaulay eh_trace-rop_hooks
0day hunting a.k.a. The story of a proper CPE test
Virtual Machine Introspection - Future of the Cloud
How to drive a malware analyst crazy
Bsides NYC 2018 - Hunting for Lateral Movement
“_____ Is Not a Security Boundary: Things I Have Learned and Things That Have...
Bridging the Gap: Lessons in Adversarial Tradecraft
Continuous intrusion: Why CI tools are an attacker’s best friends
BlueHat v18 || Memory resident implants - code injection is alive and well
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Ad

Viewers also liked (20)

PDF
Csw2016 song li-smart_wars
PDF
Csw2016 chen grassi-he-apple_graphics_is_compromised
PDF
CSW2017 Harri hursti csw17 final
PDF
Csw2016 freingruber bypassing_application_whitelisting
PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PDF
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
PDF
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
PDF
CSW2017 Scott kelly secureboot-csw2017-v1
PDF
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
PDF
CSW2017 Qidan he+Gengming liu_cansecwest2017
PDF
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
PDF
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
PDF
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
PDF
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
PDF
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
PDF
Csw2016 wang docker_escapetechnology
PDF
Csw2016 gawlik bypassing_differentdefenseschemes
PDF
Csw2016 evron sysman_apt_reports_and_opsec_evolution
PDF
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
PDF
Csw2016 economou nissim-getting_physical
Csw2016 song li-smart_wars
Csw2016 chen grassi-he-apple_graphics_is_compromised
CSW2017 Harri hursti csw17 final
Csw2016 freingruber bypassing_application_whitelisting
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Scott kelly secureboot-csw2017-v1
CSW2017 Amanda rousseau cansecwest2017_net_hijacking_powershell
CSW2017 Qidan he+Gengming liu_cansecwest2017
CSW2017 Henry li how to find the vulnerability to bypass the control flow gua...
CSW2017 Peng qiu+shefang-zhong win32k -dark_composition_finnal_finnal_rm_mark
CSW2017 Minrui yan+Jianhao-liu a visualization tool for evaluating can-bus cy...
CSW2017 Mickey+maggie low cost radio attacks on modern platforms
CSW2017 Saumil shah stegosploit_internals_cansecwest_2017
Csw2016 wang docker_escapetechnology
Csw2016 gawlik bypassing_differentdefenseschemes
Csw2016 evron sysman_apt_reports_and_opsec_evolution
Csw2016 wheeler barksdale-gruskovnjak-execute_mypacket
Csw2016 economou nissim-getting_physical
Ad

Similar to Csw2016 tang virtualization_device emulator testing technology (20)

PDF
Qinghai Tang, pacsec english-version-final
PDF
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
PPTX
Virtualization in cloud computing
PDF
Pandora FMS: VMware Enterprise Plugin
PDF
Paper sharing_Edge based intrusion detection for IOT devices
PDF
Breach and attack simulation tools
PPTX
POTASSIUM: Penetration Testing as a Service
PPTX
Web application vulnerability assessment
PPTX
Detecting Evasive Malware in Sandbox
PDF
Improving Resilience by Creating Storms in the Cloud
PDF
Malware Collection and Analysis via Hardware Virtualization
PDF
How to measure your security response readiness?
PPTX
Vm final
PPTX
Monitoring Cloud Based Applications Monitoring Cloud Based Applications
PPTX
Simics - Break the Rules of Product Development
PPTX
Virtual Machine
PPTX
Virtual Machine
PDF
virtualmachine-221120165131-6ed93077.pdf
PPTX
10 Cloud Security.pptx
PPT
Virtualization
Qinghai Tang, pacsec english-version-final
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
Virtualization in cloud computing
Pandora FMS: VMware Enterprise Plugin
Paper sharing_Edge based intrusion detection for IOT devices
Breach and attack simulation tools
POTASSIUM: Penetration Testing as a Service
Web application vulnerability assessment
Detecting Evasive Malware in Sandbox
Improving Resilience by Creating Storms in the Cloud
Malware Collection and Analysis via Hardware Virtualization
How to measure your security response readiness?
Vm final
Monitoring Cloud Based Applications Monitoring Cloud Based Applications
Simics - Break the Rules of Product Development
Virtual Machine
Virtual Machine
virtualmachine-221120165131-6ed93077.pdf
10 Cloud Security.pptx
Virtualization

Recently uploaded (20)

PPT
12 Things That Make People Trust a Website Instantly
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Course Overview and Agenda cloud security
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
Internet Safety for Seniors presentation
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
The Evolution of Traditional to New Media .pdf
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPTX
Reading as a good Form of Recreation
12 Things That Make People Trust a Website Instantly
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
The-Importance-of-School-Sanitation.pptx
Course Overview and Agenda cloud security
AI_Cyberattack_Solutions AI AI AI AI .pptx
Cyber Hygine IN organizations in MSME or
Internet Safety for Seniors presentation
t_and_OpenAI_Combined_two_pressentations
Layers_of_the_Earth_Grade7.pptx class by
The Evolution of Traditional to New Media .pdf
250152213-Excitation-SystemWERRT (1).ppt
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Introduction to cybersecurity and digital nettiquette
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Alethe Consulting Corporate Profile and Solution Aproach
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Exploring VPS Hosting Trends for SMBs in 2025
Reading as a good Form of Recreation

Csw2016 tang virtualization_device emulator testing technology