[Crib-list] CRIBB Seminar -- Friday, Oct. 5, 2012 -- TIME: 12:00 Noon in Building 32, Room 141 (Stata Center) -- SPEAKER: GENE COOPERMAN (Northeastern University)
Shirley Entzminger
daisymae at math.mit.edu
Tue Oct 2 13:07:18 EDT 2012
COMPUTATIONAL RESEARCH in BOSTON and BEYOND SEMINAR
DATE: FRIDAY, OCTOBER 5, 2012
TIME: 12:00 Noon
LOCATION: Building 32, Room 141 (Stata Center)
Pizza and beverages will be provided at 11:45 AM outside Room 32-141.
TITLE: A History of DMTCP:
Checkpoint-Restart, Reversible Debugging, Virtual Machines,
and Cyber-Security
SPEAKER: GENE COOPERMAN (Northeastern University)
ABSTRACT:
DMTCP (Distributed MultiThreaded Checkpointing) is an eight-year old open
source software project encompassing the work of about ten developers, and
available for several popular Linux distros. DMTCP has interesting
parallels with virtual machines. DMTCP's process-level checkpoints
correspond to the snapshots of a virtual machine.
In a later enhancement, DMTCP was extended to support checkpointing of GDB
sessions, which provided the basis for a reversible debugger. This
paralleled the previous work on reversible debugging via virtual machines
(King et al., Lewis et al.). The DMTCP-based reversible debugger (FReD:
Fast Reversible Debugger) stands on three legs: checkpoint-restart
(DMTCP), deterministic multi-threaded logging, and a debugger (GDB or
other). The deterministic logging supports multi-threaded, multi-core
replay. This is the basis for a module that implements a binary search in
time for the moment when a bug first appeared. Additional novel debugging
strategies are planned on top of this platform.
Quite recently, DMTCP was further enhanced to checkpoint the user-mode
Qemu virtual machine. This enables whole-machine debugging (e.g. of
Windows), and some interesting potential for cyber-security. Some
possibilities to be investigated include: rapid fuzz testing, and
low-latency cyber-hopping. Fuzz testing through checkpointing is
particularly interesting for blackbox testing, in which one compares
checkpointed memory images to quickly identify unusual memory patterns
that may indicate potential input vulnerabilities.
******************************************************************************
Massachusetts Institute of Technology
Cambridge, MA
For more information, please visit...
http://math.mit.edu/crib
More information about the CRiB-list
mailing list