Difuzzrtl: Differential fuzz testing to find cpu bugs

J Hur, S Song, D Kwon, E Baek, J Kim… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Security bugs in CPUs have critical security impacts to all the computation related hardware
and software components as it is the core of the computation. In spite of the fact that …

Fuzzing hardware like software

T Trippel, KG Shin, A Chernyakhovsky, G Kelly… - 31st USENIX Security …, 2022 - usenix.org
Hardware flaws are permanent and potent: hardware cannot be patched once fabricated,
and any flaws may undermine even formally verified software executing on top …

RFUZZ: Coverage-directed fuzz testing of RTL on FPGAs

K Laeufer, J Koenig, D Kim… - 2018 IEEE/ACM …, 2018 - ieeexplore.ieee.org
Dynamic verification is widely used to increase confidence in the correctness of RTL circuits
during the pre-silicon design phase. Despite numerous attempts over the last decades to …

Directfuzz: Automated test generation for rtl designs using directed graybox fuzzing

S Canakci, L Delshadtehrani, F Eris… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
A critical challenge in RTL verification is to generate effective test inputs. Recently, RFUZZ
proposed to use an automated software testing technique, namely Graybox Fuzzing, to …

Processorfuzz: Processor fuzzing with control and status registers guidance

S Canakci, C Rajapaksha… - … Security and Trust …, 2023 - ieeexplore.ieee.org
As the complexity of modern processors has increased over the years, developing effective
verification strategies to identify bugs prior to manufacturing has become critical. Inspired by …

{MorFuzz}: Fuzzing processor via runtime instruction morphing enhanced synchronizable co-simulation

J Xu, Y Liu, S He, H Lin, Y Zhou, C Wang - 32nd USENIX Security …, 2023 - usenix.org
Modern processors are too complex to be bug free. Recently, a few hardware fuzzing
techniques have shown promising results in verifying processor designs. However, due to …

Towards automated malware creation: code generation and code integration

A Cani, M Gaudesi, E Sanchez, G Squillero… - Proceedings of the 29th …, 2014 - dl.acm.org
This short paper proposes two different ways for exploiting an evolutionary algorithm to
devise malware: the former targeting heuristic-based anti-virus scanner; the latter optimizing …

Evolving malware variants as antigens for antivirus systems

R Murali, P Thangavel, CS Velayutham - Expert Systems with Applications, 2023 - Elsevier
This paper proposes MAGE—A Malware Antigen Generating Evolutionary algorithm that is
capable of generating unseen variants of a given source malware. MAGE evolves malware …

Multi-objective evolutionary algorithms for influence maximization in social networks

D Bucur, G Iacca, A Marcelli, G Squillero… - … 2017, Amsterdam, The …, 2017 - Springer
As the pervasiveness of social networks increases, new NP-hard related problems become
interesting for the optimization community. The objective of influence maximization is to …

Towards automatic StarCraft strategy generation using genetic programming

P Garćıa-Sánchez, A Tonda, AM Mora… - … IEEE Conference on …, 2015 - ieeexplore.ieee.org
Among Real-Time Strategy games few titles have enjoyed the continued success of
StarCraft. Many research lines aimed at developing Artificial Intelligences, or “bots”, capable …