Intelligent Graybox Fuzzing via ATPG-Guided Seed Generation and Submodule Analysis
By: Raghul Saravanan , Sudipta Paria , Aritra Dasgupta and more
Potential Business Impact:
Finds hardware bugs faster by testing smart.
Hardware Fuzzing emerged as one of the crucial techniques for finding security flaws in modern hardware designs by testing a wide range of input scenarios. One of the main challenges is creating high-quality input seeds that maximize coverage and speed up verification. Coverage-Guided Fuzzing (CGF) methods help explore designs more effectively, but they struggle to focus on specific parts of the hardware. Existing Directed Gray-box Fuzzing (DGF) techniques like DirectFuzz try to solve this by generating targeted tests, but it has major drawbacks, such as supporting only limited hardware description languages, not scaling well to large circuits, and having issues with abstraction mismatches. To address these problems, we introduce a novel framework, PROFUZZ, that follows the DGF approach and combines fuzzing with Automatic Test Pattern Generation (ATPG) for more efficient fuzzing. By leveraging ATPG's structural analysis capabilities, PROFUZZ can generate precise input seeds that target specific design regions more effectively while maintaining high fuzzing throughput. Our experiments show that PROFUZZ scales 30x better than DirectFuzz when handling multiple target sites, improves coverage by 11.66%, and runs 2.76x faster, highlighting its scalability and effectiveness for directed fuzzing in complex hardware systems.
Similar Papers
Directed Greybox Fuzzing via Large Language Model
Cryptography and Security
Finds hidden computer bugs much faster.
AFLGopher: Accelerating Directed Fuzzing via Feasibility-Aware Guidance
Cryptography and Security
Finds software bugs much faster.
PBFuzz: Agentic Directed Fuzzing for PoV Generation
Cryptography and Security
Finds software bugs much faster than before.