Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Hardware Fuzzing with An Emulator

Technical Report ·
DOI:https://doi.org/10.2172/2480163· OSTI ID:2480163
 [1];  [1];  [1]
  1. Sandia National Laboratories (SNL-CA), Livermore, CA (United States)
Bugs in digital logic have led to some significant security vulnerabilities. Hardware bugs are particularly troublesome since they cannot be easily patched. Additionally, if the bug is in the root of trust, all trust built upon it can be vulnerable. Traditional testing either require a deep knowledge of the system, creative attack vectors and lots of human interaction. This is not scalable as there are very few engineers that can wear the hat of a designer, a verification engineer, and a cybersecurity expert. Hardware fuzzing is a relatively new research area in dynamic hardware testing. It has proven to be an effective method for discovering bugs, unexpected behaviors, and security vulnerabilities in software. While hardware fuzzing is new to the hardware domain, it has a strong track record in software testing. Fuzzing is a testing technique that randomly mutates the input data to uncover bugs or vulnerabilities in the design. It is especially good at finding corner cases that test engineers can not envision. Another advantage over other dynamic testing techniques is that, if done well, deep knowledge of the design is not required. Additionally, fuzzing scales well. If the system is set up correctly, it can run unsupervised for weeks if necessary. In this work, we propose using hardware fuzzing to improve the input vector generation for an information flow tracking tool. To get reasonable throughput of test vectors, an emulator is targeted as the execution platform. Efficient emulator execution has some specific requirements.
Research Organization:
Sandia National Laboratories (SNL-CA), Livermore, CA (United States)
Sponsoring Organization:
USDOE National Nuclear Security Administration (NNSA); USDOE Laboratory Directed Research and Development (LDRD) Program
DOE Contract Number:
NA0003525
OSTI ID:
2480163
Report Number(s):
SAND--2024-14685R
Country of Publication:
United States
Language:
English

Similar Records

IoT Firmware Emulation and Its Security Application in Fuzzing: A Critical Revisit
Journal Article · Sun Jan 05 19:00:00 EST 2025 · Future Internet · OSTI ID:2496727

Speeding-up fuzzing through directional seeds
Journal Article · Thu Feb 13 19:00:00 EST 2025 · International journal of information security · OSTI ID:2516767