QEMU From the Ground
In this chapter, we will start to look at QEMU from a stricter technical point of view. We will revise why it has become fundamental in cybersecurity and we will start to look at the emulator internals, the Tiny Code Generator (TCG), and general and specialized parts of the code. We will also check out some very powerful orchestrators, such as Avatar2 and Platform for Architecture-Neutral Dynamic Analysis (PANDA). Moreover, we will go briefly over some successful cases of vulnerabilities found with QEMU.
This chapter will cover the following main topics:
- Approaching IoT devices with emulation
- Code structure
- QEMU emulation
- QEMU extensions and mods