2019
DOI: 10.1109/access.2019.2946444
|View full text |Cite
|
Sign up to set email alerts
|

UISFuzz: An Efficient Fuzzing Method for CPU Undocumented Instruction Searching

Abstract: With the rapid development of network security and the frequent appearance of CPU vulnerabilities, CPU security have gradually raised great attention and become a crucial issue in the computer field. Undocumented instructions, as one of the important threats to system security, is an important entry for CPU security research. Using fuzzing technology can automatically test the CPU instruction set and discover potential undocumented instructions, but the existing methods are of slow search speed and low accurac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 28 publications
0
5
0
Order By: Relevance
“…In 2018, Jianping Zhu et al [9] proposed a comprehensive CPU security benchmark to evaluate the hardware security of processors, which contains numerous known CPU vulnerabilities. In 2019, Xixing Li et al [10] proposed an undocumented instruction search method for CPUs of the x86 architecture named UISfuzz. This method further reduces the search space based on Sandsifter and improves the search efficiency through instruction format identification.…”
Section: The Security Of Ciscmentioning
confidence: 99%
“…In 2018, Jianping Zhu et al [9] proposed a comprehensive CPU security benchmark to evaluate the hardware security of processors, which contains numerous known CPU vulnerabilities. In 2019, Xixing Li et al [10] proposed an undocumented instruction search method for CPUs of the x86 architecture named UISfuzz. This method further reduces the search space based on Sandsifter and improves the search efficiency through instruction format identification.…”
Section: The Security Of Ciscmentioning
confidence: 99%
“…Domas [9] demonstrated a hardware back-door in a commercial x86 processor, and Duflot [1] exposed the security threats of the undocumented instructions. In response to the serious security concern over the fact that an undocumented instruction may actually exist in a commercially available off-the-shelf processor, a fuzzing test method targeting the x86 processors was proposed [2], and a later work used an improved algorithm with better performance and reduced overhead [10]. Dofferhoff et al [11] presented a reduced instruction set computer (RISC) instruction scanner that is used to search for undocumented instructions on RISC architectures implemented on emulators.…”
Section: Related Studiesmentioning
confidence: 99%
“…Therefore, the memcage method provides a more general way of scanning for undocumented instructions than provided by Domas. Xi et al [10] extend the work of Domas by further reducing the search space and associated efficiency gains. Like Domas' work, this extension only applies to x86 and an alternative to the trap flag is not proposed, which is one of the main contributions of our work.…”
Section: Related Workmentioning
confidence: 99%
“…[12] describes how the ARMv8 ISA is converted to machine readable format, used to create Verilog models for formal verification. Our system uses disassemblers as a ground truth for correct processor behavior, analog to previous work done for the x86 architecture [10], [13]. It should be noted that the disassembler may be inconsistent with the official ISA specification, although in practice the number of false positives due to disassembler bugs was small enough to make manual verification of the results viable.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation