Abstract:
Hardware-level memory vulnerabilities severely threaten computing systems. However, hardware patching is inefficient or difficult postfabrication. We investigate the effe...Show MoreMetadata
Abstract:
Hardware-level memory vulnerabilities severely threaten computing systems. However, hardware patching is inefficient or difficult postfabrication. We investigate the effectiveness of hardware fuzzing in detecting hardware memory vulnerabilities and highlight challenges and potential future research directions to enhance hardware fuzzing for memory safety.
Published in: IEEE Security & Privacy ( Volume: 22, Issue: 4, July-Aug. 2024)
Funding Agency:
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Memory Safety ,
- Open-source ,
- Cybersecurity ,
- Graphics Processing Unit ,
- Detection Approach ,
- Complex Design ,
- Security Level ,
- Specific Memory ,
- Traditional Detection ,
- Security Vulnerabilities ,
- Hardware System ,
- Potential Vulnerability ,
- Memory Component ,
- Inherent Defects ,
- Hardware Complexity ,
- System-on-chip ,
- Formal Verification ,
- Mitigation Approaches ,
- Static Techniques ,
- Instruction Set Architecture ,
- Coverage Metrics ,
- Unauthorized Access ,
- Hardware Security ,
- Causes Of Vulnerability ,
- Combinational Logic ,
- Design Space ,
- Open-source Hardware ,
- Multi-armed Bandit
Keywords assist with retrieval of results and provide a means to discovering other relevant content. Learn more.
- IEEE Keywords
- Index Terms
- Memory Safety ,
- Open-source ,
- Cybersecurity ,
- Graphics Processing Unit ,
- Detection Approach ,
- Complex Design ,
- Security Level ,
- Specific Memory ,
- Traditional Detection ,
- Security Vulnerabilities ,
- Hardware System ,
- Potential Vulnerability ,
- Memory Component ,
- Inherent Defects ,
- Hardware Complexity ,
- System-on-chip ,
- Formal Verification ,
- Mitigation Approaches ,
- Static Techniques ,
- Instruction Set Architecture ,
- Coverage Metrics ,
- Unauthorized Access ,
- Hardware Security ,
- Causes Of Vulnerability ,
- Combinational Logic ,
- Design Space ,
- Open-source Hardware ,
- Multi-armed Bandit