Vectorized Emulation: Hardware accelerated taint tracking at 2 trillion instructions per second
https://gamozolabs.github.io/fuzzing/2018/10/14/vectorized_emulation.html [gamozolabs.github.io]
2018-10-24 02:49
In this blog I’m going to introduce you to a concept I’ve been working on for almost 2 years now. Vectorized emulation. The goal is to take standard applications and JIT them to their AVX-512 equivalent such that we can fuzz 16 VMs at a time per thread. The net result of this work allows for high performance fuzzing (approx 40 billion to 120 billion instructions per second [the 2 trillion clickbait number is theoretical maximum]) depending on the target, while gathering differential coverage on code, register, and memory state.
Further since we’re running emulated code we are able to run a soft MMU implementation which has byte-level permissions. This gives us stronger-than-ASAN memory protections, making bugs fail faster and cleaner.
https://gamozolabs.github.io/fuzzing/2018/11/19/vectorized_emulation_mmu.html
source: solar