Abstract

As the complexities of processors keep increasing, the task of effectively verifying their integrity and security becomes ever more daunting. The intricate web of instructions, microarchitectural features, and interdependencies woven into modern processors pose a formidable challenge for even the most diligent verification and security engineers. To tackle this growing concern, recently, researchers have developed fuzzing techniques explicitly tailored for hardware processors. However, a prevailing issue with these hardware fuzzers is their heavy reliance on static strategies to make decisions in their algorithms. To address this problem, we develop a novel dynamic and adaptive decision-making framework, MABFuzz, that uses multi-armed bandit (MAB) algorithms to fuzz processors. MABFuzz is agnostic to, and hence, applicable to, any existing hardware fuzzer. In the process of designing MABFuzz, we encounter challenges related to the compatibility of MAB algorithms with fuzzers and maximizing their efficacy for fuzzing. We overcome these challenges by modifying the fuzzing process and tailoring MAB algorithms to accommodate special requirements for hardware fuzzing. We integrate three widely used MAB algorithms in a state-of-the-art hardware fuzzer and evaluate them on three popular RISC-V-based processors. Experimental results demonstrate the ability of MABFuzz to cover a broader spectrum of processors' intricate landscapes and doing so with remarkable efficiency. In particular, MABFuzz achieves an average speedup of 53.72× in detecting vulnerabilities and an average speedup of 3.11× in achieving coverage compared to a state-of-the-art technique.

Keywords:
Fuzz testing Computer science Algorithm Programming language Software

Metrics

8
Cited By
7.65
FWCI (Field Weighted Citation Impact)
22
Refs
0.95
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Advanced Bandit Algorithms Research
Social Sciences →  Decision Sciences →  Management Science and Operations Research
Reinforcement Learning in Robotics
Physical Sciences →  Computer Science →  Artificial Intelligence
Metaheuristic Optimization Algorithms Research
Physical Sciences →  Computer Science →  Artificial Intelligence

Related Documents

JOURNAL ARTICLE

Anytime algorithms for multi-armed bandit problems

Robert Kleinberg

Journal:   Proceedings of the seventeenth annual ACM-SIAM symposium on Discrete algorithm - SODA '06 Year: 2006 Pages: 928-936
JOURNAL ARTICLE

Anytime algorithms for multi-armed bandit problems

Robert Kleinberg

Journal:   Symposium on Discrete Algorithms Year: 2006 Pages: 928-936
BOOK-CHAPTER

Multi-armed Bandit Algorithms and Empirical Evaluation

Joannès VermorelMehryar Mohri

Lecture notes in computer science Year: 2005 Pages: 437-448
© 2026 ScienceGate Book Chapters — All rights reserved.