CrossFire: Fuzzing macOS Cross-XPU Memory on Apple Silicon

J Zhu, M Lin, T Yin, Z Cai, Y Wang, R Chang… - Proceedings of the 2024 …, 2024 - dl.acm.org
Modern computing systems increasingly utilize XPUs, such as GPUs and NPUs, for
specialized computation tasks. While these XPUs provide critical functionalities, their …

SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon

H Jang, T Kim, Y Shin - Proceedings of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Apple silicon is the proprietary ARM-based processor that powers the mainstream of Apple
devices. The move to this proprietary architecture presents unique challenges in addressing …

SyzParam: Introducing Runtime Parameters into Kernel Driver Fuzzing

Y Sun, Y Kang, C Wu, K Lu, J Wang, X Li, Y Hu… - arXiv preprint arXiv …, 2025 - arxiv.org
This paper introduces a novel fuzzing framework, SyzParam which incorporates runtime
parameters into the fuzzing process. Achieving this objective requires addressing several …

KextFuzz: A Practical Fuzzer for macOS Kernel EXTensions on Apple Silicon

T Yin, Z Gao, Z Xiao, Z Ma, M Zheng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
macOS drivers, ie, Kernel EXTensions (kexts), are attractive attack targets for adversaries.
However, automatically discovering vulnerabilities in kexts is extremely challenging …

AMFuzz: Black-Box Fuzzing of 5G Core Networks

F Mancini, S Da Canal, G Bianchi - 2024 19th Wireless On …, 2024 - ieeexplore.ieee.org
As the shift to 5G continues, the growing emphasis on software within network architecture
poses new testing hurdles. Testing becomes particularly challenging in diverse network …

[PDF][PDF] Truman: Constructing Device Behavior Models from OS Drivers to Fuzz Virtual Devices

Z Ma, Q Liu, Z Li, T Yin, W Tan, C Zhang, M Payer - hexhive.epfl.ch
Virtual devices are a large attack surface of hypervisors. Vulnerabilities in virtual devices
may enable attackers to jailbreak hypervisors or even endanger co-located virtual machines …