Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

To catch instruction execution patterns #43

Open
darshantank opened this issue Dec 9, 2019 · 3 comments
Open

To catch instruction execution patterns #43

darshantank opened this issue Dec 9, 2019 · 3 comments

Comments

@darshantank
Copy link

We have set up one VM (Virtual Machine) (Ubuntu Desktop 16.04) on VMM (virtual-manager) running QEMU / KVM. We are using Ubuntu Desktop 16.04 as our host OS.

We execute suspicious C language code on our guest VM.

We want to catch RDTSC and CLFLUSH instructions executed in the form of suspicious C language code on our guest VM. We would like to trace assembly instruction execution patterns ( RDTSC - CLFLUSH - RDTSC ) running on our guest VM from our host OS.

May we use " Kvm-vmi " tool for the said task? How do we accomplish this task?

We would greatly appreciate it if you kindly give us some feedback and share your views.

@Wenzel
Copy link
Member

Wenzel commented Dec 9, 2019

cc @adlazar, @mdontu can kvm-vmi be used to intercept RDTSC or CLFLUSH ? 🤔

@tklengyel
Copy link

RDTSC can be trapped, yes. I don't think you can trap clflush.

@darshantank
Copy link
Author

@ tklengyel

Thanks for your concern and response.

How do we trap RDTSC using kvm-vmi?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants