GoldenFuzz: Generative Golden Reference Hardware Fuzzing
By: Lichao Wu , Mohamadreza Rostami , Huimin Li and more
Potential Business Impact:
Finds hidden bugs in computer chips faster.
Modern hardware systems, driven by demands for high performance and application-specific functionality, have grown increasingly complex, introducing large surfaces for bugs and security-critical vulnerabilities. Fuzzing has emerged as a scalable solution for discovering such flaws. Yet, existing hardware fuzzers suffer from limited semantic awareness, inefficient test refinement, and high computational overhead due to reliance on slow device simulation. In this paper, we present GoldenFuzz, a novel two-stage hardware fuzzing framework that partially decouples test case refinement from coverage and vulnerability exploration. GoldenFuzz leverages a fast, ISA-compliant Golden Reference Model (GRM) as a ``digital twin'' of the Device Under Test (DUT). It fuzzes the GRM first, enabling rapid, low-cost test case refinement, accelerating deep architectural exploration and vulnerability discovery on DUT. During the fuzzing pipeline, GoldenFuzz iteratively constructs test cases by concatenating carefully chosen instruction blocks that balance the subtle inter- and intra-instructions quality. A feedback-driven mechanism leveraging insights from both high- and low-coverage samples further enhances GoldenFuzz's capability in hardware state exploration. Our evaluation of three RISC-V processors, RocketChip, BOOM, and CVA6, demonstrates that GoldenFuzz significantly outperforms existing fuzzers in achieving the highest coverage with minimal test case length and computational overhead. GoldenFuzz uncovers all known vulnerabilities and discovers five new ones, four of which are classified as highly severe with CVSS v3 severity scores exceeding seven out of ten. It also identifies two previously unknown vulnerabilities in the commercial BA51-H core extension.
Similar Papers
Logic Solver Guided Directed Fuzzing for Hardware Designs
Cryptography and Security
Finds computer chip mistakes faster and better.
Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts
Cryptography and Security
Finds hidden security flaws in computer chips.
Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts
Cryptography and Security
Finds hidden computer secrets that could be stolen.