Using `gdb` to Debug the Linux Kernel

Using `gdb` to Debug the Linux Kernel

Intro to Using gdb to Debug the Linux Kernel There are many great tools that are useful for debugging the Linux kernel, including good old-fashioned printk, ftrace, and kgdb. In this post we’ll be exploring how to use the kernel debugger (kgdb) to debug a QEMU...
Benchmarking Xen Virtualization

Benchmarking Xen Virtualization

Introduction to Xen Virtualization Types (PV, PVHVM, PVH) Xen is an open-source baremetal hypervisor that is widely used by commercial and non-commercial platforms to provide virtualization support. However, unlike most other hypervisors, Xen supports multiple ways of...
Adding SHA256 Digests to RPMs

Adding SHA256 Digests to RPMs

RPM Structure Overview The RPM package format, as used by RedHat Linux, CentOS and others provides multiple mechanisms for verifying package integrity and authenticity before installation. Mechanisms for integrity and authenticity include: MD5 and SHA1 hashes of the...
Nesting XenBlanket on AWS

Nesting XenBlanket on AWS

As a security company with a focus on utilizing hypervisor technology, the team at Star Lab wanted to research potential hypervisor-based solutions for cloud security. The demand for cloud services has skyrocketed worldwide, with an increasing amount of critical...
Encrypting in a Dangerous World

Encrypting in a Dangerous World

Suppose you have a very difficult threat model for your embedded system. Not only is your adversary technically skilled, but they are going to have physical access to your device.Maybe you are exporting a SCADA controller containing critical or trade secret data to a...
Designing for Isolation Using Virtualization

Designing for Isolation Using Virtualization

In October 2018, the GAO released a report on cyber vulnerabilities in weapons systems. This report highlights the need to consider cyber survivability in the weapons system design process. At Star Lab, we think virtualization is an enabling technology that...