[U25]Semzhu-Project – A self-made new world of embedded hypervisors and attack detection methods
===
:::info
- **Date:** Oct.29th 18:20-19:00
- **Speaker:** Yoshifumi_Shu
- **Category:** U25 - Main Track
> The use and study of hypervisors for embedded systems is active now. However, at the present, there are few hypervisors which are easy to add one`s own modification and to test its validity for individual interests. <br><br>As compared to other fields, the start of study on embedded hypervisors is not long, and there exist many spaces for improvements. I believe new methods for using hypervisors have the possibility to solve various existing problems in computer systems. Based on such an idea, a project, the Semzhu-Project, was launched on embedded hypervisors.<br><br>The current outputs of Semzhu-Project include:<br> - 1) Development of Semzhu-Visor, a simplified embedded hypervisor for AArch64, which runs on a modified QEMU, an open source CPU emulator.<br> - 2) Development of attack detection methods for embedded systems, “AsROP"and"AsCOP," using an embedded hypervisor<br><br>Usually it is considered not easy to develop any "security function" for those who are not experts in the field. In this talk, I raise some practical problems found in previous research on attack detection methods for embedded systems, and show the detailed process of developing the methods, "AsROP"and"AsCOP", as solutions to those problems. Through this talk, you will see how one ignorant high-school student could develop those security functions in a single one year.<br><br>* Semzhu Project is the result of research and development in SecHack365, a Japanese security hackathon conducted by NICT in order to train young security innovators.
:::
###### tags: `CODEBLUE2019`,`CODEBLUE`