Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-virtualization
Collection of resources about Virtualization
https://github.com/Wenzel/awesome-virtualization
Last synced: about 2 hours ago
JSON representation
-
CVEs
-
Hyper-V
- VirtualBox 3D Acceleration: An Acceleration Attack Surface
- Better slow than sorry - VirtualBox 3D acceleration considered harmful
- A bunch of Red Pills: VMware Escapes
- Pandavirtualization: Exploiting the Xen hypervisor
- Wandering through the Shady Corners of VMware Workstation/Fusion
- CVE-2018-2844: From Compiler Optimization to Code Execution - VirtualBox VM Escape
- CVE-2017-3558: Oracle VM VirtualBox - Guest-to-Host Privilege Escalation via Broken Length Handling in slirp Copy
- Analyzing a Patch of a Virtual Machine Escape on VMware
-
-
Documentation
-
Books
-
Courses
-
AMD
- Memory Virtualization playlist by Udacity
- Full Virtualization by Geoffrey Challen
- Xen and the Art of Virtualization by Geoffrey Challen
- Container Virtualization by Geoffrey Challen
- From Kernel to VMM
- MMU Virtualization via Intel EPT
- Virtualization and Computing Lectures
- Memory Virtualization playlist by Udacity
-
-
Papers
-
AMD
- A comparison of software and hardware techniques for x86 virtualization by K. Adams and O. Agesen (2006)
- Bringing Virtualization to the x86 Architecture with the Original VMware Workstation by Edouard Bugnion, Scott Devine, Mendel Rosenblum, Jeremy Sugerman, And Edward Y. Wang
- The evolution of an x86 virtual machine monitor by O. Agesen, A. Garthwaite, J. Sheldon, and P. Subrahmanyam
- Formal Requirements for Virtualizable Third Generation Architectures by Gerald J. Popek & Robert P. Goldberg
- Modern Operating System 4th Edition (Chapter: Virtualization and the cloud) by Andrew Tanembaum
- Xen and the Art of Virtualization by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield
- Understanding Full Virtualization, Paravirtualization and Hardware Assisted Virtualization by VMWare
- Dynamic Binary Translation from x86-32 code to x86-64 code for Virtualization by Yu-hsin Chen.
- MemoryRanger Prevents Hijacking FILE_OBJECT Structures in Windows Kernel by Igor Korkin (2019)
- HyperDbg: Reinventing Hardware-Assisted Debugging
- HyperDbg: Reinventing Hardware-Assisted Debugging
- The Reversing Machine: Reconstructing Memory Assumptions
-
-
Research Projects
-
Mainstream Hypervisors Documentation
-
KVM
-
QEMU
-
VMware
-
VirtualBox
-
Hyper-V
- Hyper-V internals researches (2006-2019)
- Battle of SKM and IUM
- Ring 0 to Ring -1 Attacks
- Virtualization Based Security - Part 1: The boot process
- Virtualization Based Security - Part 2: kernel communications
- Hyper-V and its Memory Manager
- Hyper-V #0x1 - Hypercalls part 1
- Hyper-V LIS
- Virtualization Documentation
-
-
Hypervisor Development
-
Hypervisor From Scratch
- Part 2: Entering VMX Operation
- Part 3: Setting up Our First Virtual Machine
- Part 4: Address Translation Using Extended Page Table (EPT)
- Part 5: Setting up VMCS & Running Guest Code
- Part 6: Virtualizing An Already Running System
- Part 7: Using EPT & Page-Level Monitoring Features
- Part 8: How To Do Magic With Hypervisor!
-
5 Days to Virtualization
- Day 0: Virtual Environment Setup, Scripts, and WinDbg
- Day 1: Introduction to Virtualization, Type Definitions, and Support Testing
- Day 2: Entering VMX Operation, Explaining Implementation Requirements
- Day 3: The VMCS, Component Encoding, and Multiprocessor Initialization
- Day 4: VMCS Initialization, Segmentation, and Operation Visualization
- Day 5: The VM-exit Handler, Event Injection, Context Modifications, and CPUID Emulation
-
-
Virtual Machine Introspection
-
5 Days to Virtualization
- Zero-Footprint Guest Memory Introspection from Xen by Mihai Dontu - [[Slides]](https://www.slideshare.net/xen_com_mgr/zero-footprint-guest-memory-introspection-from-xen) [[Update]](http://events17.linuxfoundation.org/sites/events/files/slides/Zero-Footprint%20Guest%20Memory%20Introspection%20with%20Xen.pdf)
- Hypervisor memory introspection at the next level
- Hypervisor-based, hardware-assisted system monitoring
- Virtual Machine Introspection to Detect and Protect
- Hypervisor Memory Forensics - [[Slides]](http://s3.eurecom.fr/~emdel/talks/grazianolanzi_hitb.pdf)
- Who Watches The Watcher? Detecting Hypervisor Introspection from Unprivileged Guests
- DRAKVUF Black-box Binary Analysis for in-depth execution tracing of arbitrary binaries
- Patchguard: Detection of Hypervisor Based Introspection - P1
- Patchguard: Detection of Hypervisor Based Introspection - P2
- Bringing Commercial Grade Virtual Machine Introspection to KVM by Mihai Donțu - [[Slides]](http://events17.linuxfoundation.org/sites/events/files/slides/Zero-Footprint%20Guest%20Memory%20Introspection%20with%20Xen.pdf)
- Reversing with HyperDbg (Dbg3301) - OpenSecurityTraining
-
-
Malware analysis
-
Attacking Hypervisors
-
5 Days to Virtualization
- Blackhat 2010 - Hacking the Hypervisor
- Software Attacks on Hypervisor Emulation of Hardware - [[Slides]](https://www.troopers.de/downloads/troopers17/TR17_Attacking_hypervisor_through_hardwear_emulation.pdf)
- Lessons Learned from Eight Years of Breaking Hypervisors - [[Slides]](https://www.blackhat.com/docs/eu-14/materials/eu-14-Wojtczuk-Lessons-Learned-From-Eight-Years-Of-Breaking-Hypervisors.pdf)
- Attacking Hypervisors Using Firmware And Hardware - [[Slides]](http://c7zero.info/stuff/AttackingHypervisorsViaFirmware_bhusa15_dc23.pdf)
- The Arms Race Over Virtualization - [[Slides]](https://www.blackhat.com/docs/us-16/materials/us-16-Luan-Ouroboros-Tearing-Xen-Hypervisor-With-The-Snake.pdf)
- Hypervisor Vulnerability Research - State of the Art
- Glitches in the Matrix – Escape via NMI
-
KVM
- Virtualization under attack: Breaking out of KVM - [[Slides]](http://www.hakim.ws/DEFCON19/Speakers/Elhage/DEFCON-19-Elhage-Virtualization-Under-Attack.pdf)
- Performant Security Hardening of KVM by Steve Rutherford - [[Slides]](http://www.linux-kvm.org/images/3/3d/01x02-Steve_Rutherford-Performant_Security_Hardening_of_KVM.pdf)
-
Xen
- Ouroboros: Tearing Xen Hypervisor With the Snake
- Subverting the Xen hypervisor
- Preventing and Detecting Xen Hypervisor Subversions
- Bluepilling the Xen Hypervisor
- XenPwn: Breaking paravirtualized devices - [[Slide]](https://www.blackhat.com/docs/us-16/materials/us-16-Wilhelm-Xenpwn-Breaking-Paravirtualized-Devices-wp.pdf)
- Xen exploitation part 1: XSA-105, from nobody to root
- Xen exploitation part 2: XSA-148, from guest to host
- Advanced Exploitation: Xen Hypervisor VM Escape
-
VMware
-
VirtualBox
- Unboxing your virtualBox - [[Slides]](https://raw.githubusercontent.com/phoenhex/files/master/slides/unboxing_your_virtualboxes.pdf)
- Breaking Out of VirtualBox through 3D Acceleration - [[Slides]](https://www.coresecurity.com/system/files/publications/2016/05/corelabs-Breaking_Out_of_VirtualBox_through_3D_Acceleration-Francisco_Falcon.pdf)
- VirtualBox VMSVGA VM Escape
- VirtualBox NAT DHCP/BOOTP server vulnerabilities
-
Hyper-V
- Security Assessment of Microsoft Hyper-V
- Ring 0 to Ring -1 Exploitation with Hyper-V IPC
- Breaking VSM by Attacking SecureKernel
- VBS and VSM Internals
- A Dive in to Hyper-V Architecture & Vulnerabilities
- Hardening Hyper-V through offensive security research - Black Hat
- Growing Hypervisor 0day with Hyperseed
-
Categories