Skip to content

Latest commit

 

History

History
121 lines (90 loc) · 4.18 KB

File metadata and controls

121 lines (90 loc) · 4.18 KB

J.K.GO Logo

Website Badge Focus Badge QEMU Badge Domain Badge


J.K.GO — Journey of Kernel, Let’s GO

Exploring the invisible layers between hardware and software.
We operate under the slogan “All In, Always.”

Official Website: https://jkgo.kr


About J.K.GO

J.K.GO is a research and development team specializing in low-level system internals, virtualization, and hardware abstraction layers.
We develop a QEMU-based Virtual Hardware Debugger, aiming not just to emulate but to reconstruct, observe, and control the entire system with precision.

Primary research areas include:

  • x86_64 Guest Analysis
  • IRQ Timeline Reconstruction
  • Snapshot-based State Rewinding
  • Deterministic Replay & Execution Tracing
  • Virtual Machine Introspection (VMI)

Our goal is to reveal the “invisible flow” between the operating system, hypervisor, and hardware model—
providing tools that enable researchers and developers to deeply understand system behavior.


Focus Areas

Virtual Hardware Debugger

  • Deep inspection of QEMU’s Multi-threaded TCG translation layer
  • Visualization of hardware event timelines (IRQ, APIC, MMU, Timer, I/O, etc.)
  • Non-invasive tracing without modifying the guest operating system
  • Snapshot-based deterministic execution and replay engine

System Virtualization

  • Real-time analysis of x86_64 paging structures (PML4 → PT)
  • VM-Exit–driven event logging & execution flow reconstruction
  • CPU state inspection in SMP environments & cache coherency modeling
  • Hypervisor-level analysis of kernel behavior

Memory Forensics

  • Incremental snapshot diffing of memory state
  • PFN database reconstruction & automated page table walking
  • Time-travel reconstruction of historical system states
  • Memory tampering detection and forensic automation

Our Vision

“Recreate, Observe, and Control the System — without physical hardware.”

We build technologies that enable us to precisely reproduce and analyze every event inside the operating system—
without requiring any physical hardware at all.

Our long-term vision includes:

  • A fully software-based debugging and analysis environment
  • High-fidelity OS behavior observation tools
  • A repeatable, research-friendly virtualization platform
  • A new paradigm for analyzing systems through a time-indexed perspective

Beyond a debugger,
we aim to create a platform that interprets the entire system through the dimension of time.


Current Projects

SVHD — Snapshot-based Virtual Hardware Debugger

  • IRQ-driven snapshot timeline generation
  • Memory & CPU state diffing engine
  • Instruction-level execution trace logging
  • Reconstruction of APIC, LAPIC, PIT, I/O event flows
  • PFN & Page Table analysis toolkit
  • Guest-driven timeline reconstruction engine

JKGO Toolchain

  • Snapshot Loader
  • Memory Forensics Analyzer
  • QEMU Plugin Development Framework
  • Page Table / Timeline Visualization Toolkit

Collaboration

We welcome collaboration in the following fields:

  • OS & System Software Engineering
  • Memory Forensics / VMI Research
  • Virtualization and Emulation Technology
  • QEMU / KVM / Xen / Bochs Developers

Join the Journey

If you want to explore the invisible depths of system internals,
feel free to join us through Issues or Pull Requests.

Journey of Kernel — Let’s GO deeper.

Official Website: https://jkgo.kr