Johannes Lenzen (Technical University of Darmstadt), Mohamadreza Rostami (Technical University of Darmstadt), Lichao Wu (TU Darmstadt), Ahmad-Reza Sadeghi (Technical University of Darmstadt)

Modern Central Processing Units (CPUs) are black boxes, proprietary, and increasingly characterized by sophisticated microarchitectural flaws that evade traditional analysis. While some of these critical vulnerabilities have been uncovered through cumbersome manual effort, building an automated and systematic vulnerability detection framework for real-world post-silicon processors remains a challenge.

In this paper, we present Fuzzilicon, the first post-silicon fuzzing framework for real-world x86 CPU that brings deep introspection into the microcode and microarchitectural layers. Fuzzilicon automates the discovery of vulnerabilities that were previously only detectable through extensive manual reverse engineering, and bridges the visibility gap by introducing microcode-level instrumentation. At the core of Fuzzilicon is a novel technique for extracting feedback directly from the processor's microarchitecture, enabled by reverse-engineering textit{Intel}'s proprietary microcode update interface. We develop a minimally intrusive instrumentation method and integrate it with a hypervisor-based fuzzing harness to enable precise, feedback-guided input generation, without access to Register Transfer Level (RTL) or vendor support.

Applied to textit{Intel}'s textit{Goldmont} microarchitecture, Fuzzilicon introduces 5 significant findings, including two previously unknown microcode‑level speculative‑execution vulnerabilities. Besides, the Fuzzilicon framework automatically rediscover the $mu$Spectre class of vulnerabilities, which were detected manually in the previous work. Fuzzilicon reduces coverage collection overhead by up to 31$times$ compared to baseline techniques and achieves 16.27% unique microcode coverage of hookable locations, the first empirical baseline of its kind. As a practical, coverage-guided, and scalable approach to post-silicon fuzzing, Fuzzilicon establishes a new foundation to automate the discovery of complex CPU vulnerabilities.

View More Papers

VDORAM: Towards a Random Access Machine with Both Public...

Huayi Qi (Shandong University), Minghui Xu (Shandong University), Xiaohua Jia (City University of Hong Kong), Xiuzhen Cheng (Shandong University)

Read More

Character-Level Perturbations Disrupt LLM Watermarks

Zhaoxi Zhang (University of Technology Sydney), Xiaomei Zhang (Griffith University), Yanjun Zhang (University of Technology Sydney), He Zhang (RMIT University), Shirui Pan (Griffith University), Bo Liu (University of Technology Sydney), Asif Qumer Gill (University of Technology Sydney Australia), Leo Zhang (Griffith University)

Read More

PhantomMap: GPU-Assisted Kernel Exploitation

Jiayi Hu (Zhejiang University), Qi Tang (Jilin University), Xingkai Wang (Zhejiang University), Jinmeng Zhou (Zhejiang University), Rui Chang (Zhejiang University), Wenbo Shen (Zhejiang University)

Read More