Summary
In this chapter, we explored state-of-the-art emulation and possible alternatives. We dived into the history of computation, software testing, and many aspects of safety and security where emulation has started to play a fundamental role to help us avoid or mitigate issues.
In the next chapter, we will dive deep into QEMU and its internals, and how code is transformed and executed. We will also have a look at Python frontends that specialize in QEMU for embedded systems and malware analysis.