Revizor - a fuzzer to search for microarchitectural leaks in CPUs
Перейти к файлу
Oleksii Oleksenko 8d679e1b59 src/executor/x86: Evict+Reload mode 2021-02-25 16:30:19 +01:00
evaluation renaming of two config variables 2021-02-23 16:29:05 +01:00
src src/executor/x86: Evict+Reload mode 2021-02-25 16:30:19 +01:00
.editorconfig configuration files 2021-02-18 16:50:50 +00:00
.gitignore README: Unicorn was missing from the list of dependencies 2021-02-19 18:36:05 +01:00
.gitmodules src/executor: added x86 executor as a submodule 2021-02-18 16:29:34 +00:00
AUTHORS credits 2021-02-18 16:02:15 +00:00
Arch.png Prototype implementation by Oleksii Oleksenko of Model-based Relational Fuzzing for Speculation Contracts 2021-02-15 22:26:33 +00:00
LICENSE Initial LICENSE commit 2021-01-29 09:14:06 -08:00
README.md src/tests: a more reliable MDS test 2021-02-25 16:16:10 +01:00

README.md

SCA-Fuzzer

This is SCA-Fuzzer, a different kind of fuzzer. Instead of finding bugs in programs, SCA-Fuzzer searches for microarchitectural bugs in CPUs.

What is a bug in a CPU? In the context of SCA-Fuzzer, a bug is a violation of out expectations about how the CPU should behave. The most prominent examples would be Spectre and Meltdown. It could also be a microarchitectural backdoor or an unknown optimization, although we are yet to encounter one of those.

See our [Technical Report] (under construction) for details.

Origin: This is an independently developed and improved fork of SCA-Fuzzer from Microsoft.

Getting Started

Below are quick-and-dirty instructions on how to use SCA-Fuzzer. More detailed instructions will be added some time later.

Warning: SCA-Fuzzer executes randomly generated code in kernel space. As you can imagine, things can go wrong. Usually they don't, but sometimes they do. So, make sure you're not running these experiments on an important machine.

  1. Requirements:

  2. Get dependencies:

git submodule init
git submodule update
cp src/executor/x86/base.xml instruction_sets/x86
  1. Install the x86 executor:
cd src/executor/x86 
sudo rmmod x86-executor
make clean
make
sudo insmod x86-executor.ko
  1. Test it:
cd src/
./tests/run.bats

If some of the "Detection" tests fail, it's fine, you might just have a slightly different microarchitecture. But if other tests fail - something is broken.

  1. Fuzz it:

This one should not detect any violations and should take a few minutes to run:

cd src/
./cli.py fuzz -s instruction_sets/x86/base.xml -i 1000 -n 10 -v -c ../evaluation/1_fuzzing_main/bm-bpas.yaml
  1. Find your first Spectre!

This one should detect a violations within several minutes. The detected violation is most likely an instance of Spectre V1.

cd src/
./cli.py fuzz -s instruction_sets/x86/base.xml -i 100 -n 1000 -v -c ../evaluation/fast-spectre-v1.yaml

You can find the test case that triggered this violation in src/generated.asm.

Interfaces and Architecture

architecture

Under construction