Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts
By: Gideon Geier, Pariya Hajipour, Jan Reineke
Potential Business Impact:
Finds hidden security flaws in computer chips.
Hardware-software leakage contracts have emerged as a formalism for specifying side-channel security guarantees of modern processors, yet verifying that a complex hardware design complies with its contract remains a major challenge. While verification provides strong guarantees, current verification approaches struggle to scale to industrial-sized designs. Conversely, prevalent hardware fuzzing approaches are designed to find functional correctness bugs, but are blind to information leaks like Spectre. To bridge this gap, we introduce a novel and scalable approach: coverage-guided hardware-software contract fuzzing. Our methodology leverages a self-compositional framework to make information leakage directly observable as microarchitectural state divergence. The core of our contribution is a new, security-oriented coverage metric, Self-Composition Deviation (SCD), which guides the fuzzer to explore execution paths that violate the leakage contract. We implemented this approach and performed an extensive evaluation on two open-source RISC-V cores: the in-order Rocket Core and the complex out-of-order BOOM core. Our results demonstrate that coverage-guided strategies outperform unguided fuzzing and that increased microarchitectural coverage leads to a faster discovery of security vulnerabilities in the BOOM core.
Similar Papers
Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts
Cryptography and Security
Finds hidden computer secrets that could be stolen.
Logic Solver Guided Directed Fuzzing for Hardware Designs
Cryptography and Security
Finds computer chip mistakes faster and better.
Code Difference Guided Fuzzing for FPGA Logic Synthesis Compilers via Bayesian Optimization
Software Engineering
Finds hidden mistakes in computer chip designs.