【24h】

Fuzz testing in AWS Firecracker hypervisor

机译:AWS鞭炮虚拟机管理程序中的模糊测试

获取原文

摘要

Virtualization technologies employed by the cloud providers allow scalable and fast deployment of computation resources at a small cost. Being a core component in the cloud configuration, the hypervisor becomes the target of outside attacks that try to disrupt the normal operation of other users’ systems or to gain control over the cloud infrastructure. Therefore, an effective and reliable method of discovering security vulnerabilities inside the hypervisors is needed.We created a testing environment that employs fuzzing to detect possible vulnerabilities inside the Firecracker hypervisor. We present a complete fuzzing toolchain that can be integrated into the Firecracker development cycle to discover and report bugs that can be missed by other testing methods. Our solution was internally tested by the Amazon Web Services team with promising results.
机译:云提供商采用的虚拟化技术允许以小的成本进行可扩展和快速部署计算资源。 作为云配置中的核心组件,管理程序成为外部攻击的目标,该目标试图扰乱其他用户系统的正常运行或增强对云基础架构的控制。 因此,需要一种在虚拟机管理程序内发现安全漏洞的有效且可靠的方法。我们创建了一个测试环境,采用模糊来检测爆竹虚拟机管理程序内的可能漏洞。 我们提出了一个完整的模糊工具链,可以集成到鞭炮开发周期中,以发现和报告其他测试方法可能错过的错误。 我们的解决方案是由亚马逊Web服务团队的内部测试,具有有希望的结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号