In the evolving landscape of integrated circuit (IC) design, the increasing complexity of modern processors and intellectual property (IP) cores has introduced new challenges in ensuring design correctness and security. The recent advancements in hardware fuzzing techniques have shown their efficacy in detecting hardware bugs and vulnerabilities at the RTL abstraction level of hardware. However, they suffer from several limitations, including an inability to address vulnerabilities introduced during synthesis and gate-level transformations. These methods often fail to detect issues arising from library adversaries, where compromised or malicious library components can introduce backdoors or unintended behaviors into the design. In this paper, we present a novel hardware fuzzer, SynFuzz, designed to overcome the limitations of existing hardware fuzzing frameworks. SynFuzz focuses on fuzzing hardware at the gate-level netlist to identify synthesis bugs and vulnerabilities that arise during the transition from RTL to the gate-level. We analyze the intrinsic hardware behaviors using coverage metrics specifically tailored for the gate-level. Furthermore, SynFuzz implements differential fuzzing to uncover bugs associated with EDA libraries. We evaluated SynFuzz on popular open-source processors and IP designs, successfully identifying 7 new synthesis bugs. Additionally, by exploiting the optimization settings of EDA tools, we performed a compromised library mapping attack (CLiMA), creating a malicious version of hardware designs that remains undetectable by traditional verification methods. We also demonstrate how SynFuzz overcomes the limitations of the industry-standard formal verification tool, Cadence Conformal, providing a more robust and comprehensive approach to hardware verification.
翻译:在集成电路(IC)设计不断演进的背景下,现代处理器和知识产权(IP)核日益增长的复杂性为保障设计正确性和安全性带来了新的挑战。近年来,硬件模糊测试技术在硬件RTL抽象层级检测硬件错误与漏洞方面已展现出显著成效。然而,现有方法存在若干局限,包括无法应对综合及门级转换过程中引入的漏洞。这些方法通常难以检测由库攻击者引发的问题,即受损或恶意的库组件可能在设计中植入后门或非预期行为。本文提出一种新型硬件模糊测试工具SynFuzz,旨在克服现有硬件模糊测试框架的局限性。SynFuzz专注于门级网表的模糊测试,以识别从RTL到门级转换过程中产生的综合错误与漏洞。我们采用专门为门级设计的覆盖率指标来分析硬件固有行为。此外,SynFuzz通过差分模糊测试来发现与EDA库相关的错误。我们在主流开源处理器和IP设计上对SynFuzz进行评估,成功识别出7个新的综合错误。通过利用EDA工具的优化设置,我们实施了受损库映射攻击(CLiMA),创建了传统验证方法无法检测的恶意硬件设计版本。实验还证明SynFuzz能够克服业界标准形式验证工具Cadence Conformal的局限,为硬件验证提供了更鲁棒且全面的解决方案。