Fuzzilicon: A Post-Silicon Microcode-Guided x86 CPU Fuzzer
By: Johannes Lenzen , Mohamadreza Rostami , Lichao Wu and more
Potential Business Impact:
Finds hidden computer chip flaws automatically.
Modern CPUs are black boxes, proprietary, and increasingly characterized by sophisticated microarchitectural flaws that evade traditional analysis. While some of these critical vulnerabilities have been uncovered through cumbersome manual effort, building an automated and systematic vulnerability detection framework for real-world post-silicon processors remains a challenge. In this paper, we present Fuzzilicon, the first post-silicon fuzzing framework for real-world x86 CPUs that brings deep introspection into the microcode and microarchitectural layers. Fuzzilicon automates the discovery of vulnerabilities that were previously only detectable through extensive manual reverse engineering, and bridges the visibility gap by introducing microcode-level instrumentation. At the core of Fuzzilicon is a novel technique for extracting feedback directly from the processor's microarchitecture, enabled by reverse-engineering Intel's proprietary microcode update interface. We develop a minimally intrusive instrumentation method and integrate it with a hypervisor-based fuzzing harness to enable precise, feedback-guided input generation, without access to Register Transfer Level (RTL). Applied to Intel's Goldmont microarchitecture, Fuzzilicon introduces 5 significant findings, including two previously unknown microcode-level speculative-execution vulnerabilities. Besides, the Fuzzilicon framework automatically rediscover the $μ$Spectre class of vulnerabilities, which were detected manually in the previous work. Fuzzilicon reduces coverage collection overhead by up to 31$\times$ compared to baseline techniques and achieves 16.27% unique microcode coverage of hookable locations, the first empirical baseline of its kind. As a practical, coverage-guided, and scalable approach to post-silicon fuzzing, Fuzzilicon establishes a new foundation to automate the discovery of complex CPU vulnerabilities.
Similar Papers
Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts
Cryptography and Security
Finds hidden security flaws in computer chips.
Coverage-Guided Pre-Silicon Fuzzing of Open-Source Processors based on Leakage Contracts
Cryptography and Security
Finds hidden computer secrets that could be stolen.
GoldenFuzz: Generative Golden Reference Hardware Fuzzing
Cryptography and Security
Finds hidden bugs in computer chips faster.