Directed test generation for hardware validation: A survey

A Jayasena, P Mishra - ACM Computing Surveys, 2024 - dl.acm.org
The complexity of hardware designs has increased over the years due to the rapid
advancement of technology coupled with the need to support diverse and complex features …

{HyPFuzz}:{Formal-Assisted} Processor Fuzzing

C Chen, R Kande, N Nguyen, F Andersen… - 32nd USENIX Security …, 2023 - usenix.org
Recent research has shown that hardware fuzzers can effectively detect security
vulnerabilities in modern processors. However, existing hardware fuzzers do not fuzz well …

Socfuzzer: Soc vulnerability detection using cost function enabled fuzz testing

MM Hossain, A Vafaei, KZ Azar… - … , Automation & Test …, 2023 - ieeexplore.ieee.org
The modern System-on-Chips (SoCs), with numerous complex and heterogeneous
intellectual properties (IPs), and the inclusion of highly-sensitive assets, become the target of …

Sharpen: Soc security verification by hardware penetration test

H Al-Shaikh, A Vafaei, MMM Rahman, KZ Azar… - Proceedings of the 28th …, 2023 - dl.acm.org
As modern SoC architectures incorporate many complex/heterogeneous intellectual
properties (IPs), the protection of security assets has become imperative, and the number of …

The Emergence of Hardware Fuzzing: A Critical Review of its Significance

R Saravanan, SMP Dinakarrao - arXiv preprint arXiv:2403.12812, 2024 - arxiv.org
In recent years, there has been a notable surge in attention towards hardware security,
driven by the increasing complexity and integration of processors, SoCs, and third-party IPs …

TaintFuzzer: SoC security verification using taint inference-enabled fuzzing

MM Hossain, NF Dipu, KZ Azar… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Modern System-on-Chip (SoC) designs containing sensitive information have become
targets of malicious attacks. Unfortunately, current verification practices still undermine the …

Genfuzz: Gpu-accelerated hardware fuzzing using genetic algorithm with multiple inputs

DL Lin, Y Zhang, H Ren, B Khailany… - 2023 60th ACM/IEEE …, 2023 - ieeexplore.ieee.org
Hardware fuzzing has emerged as a promising automatic verification technique to efficiently
discover and verify hardware vulnerabilities. However, hardware fuzzing can be extremely …

PSOFuzz: Fuzzing processors with particle swarm optimization

C Chen, V Gohil, R Kande, AR Sadeghi… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Hardware security vulnerabilities in computing systems compromise the security defenses of
not only the hardware but also the software running on it. Recent research has shown that …

Processorfuzz: Processor fuzzing with control and status registers guidance

S Canakci, C Rajapaksha… - … Security and Trust …, 2023 - ieeexplore.ieee.org
As the complexity of modern processors has increased over the years, developing effective
verification strategies to identify bugs prior to manufacturing has become critical. Inspired by …

AutoCC: Automatic Discovery of Covert Channels in Time-Shared Hardware

M Orenes-Vera, H Yun, N Wistoff, G Heiser… - Proceedings of the 56th …, 2023 - dl.acm.org
Covert channels enable information leakage between security domains that should be
isolated by observing execution differences in shared hardware. These channels can …