TheHuzz: Instruction Fuzzing of Processors Using Golden-Reference Models for Finding Software-Exploitable Vulnerabilities.
Aakash TyagiAddison CrumpAhmad-Reza SadeghiGarrett PersynJeyavijayan RajendranPatrick JauernigRahul KandePublished in: CoRR (2022)
Keyphrases
- reference models
- reference model
- computer software
- instruction set
- computer systems
- source code
- software systems
- process model
- security vulnerabilities
- business processes
- enterprise architecture
- information security
- design patterns
- security requirements
- software architecture
- semantic interoperability
- multimedia
- petri net
- software development
- text mining
- software engineering
- long term