2023.11.15
Reptar
TLDR:采用方法fuzzing test和自创的Oracle Serialization发现了有关rep前缀的处理器bug。
这个作者的另一篇文章Zenbleed提到了几个有意思的发掘处理器bug的方法:
- reversi: The general idea is that for every random instruction you generate, you also generate the inverse (e.g. ADD r1, r2 → SUB r1, r2).
- Oracle: 和正确的机器/模拟器进行比较
- Oracle Serialization(作者自创的方法): 原指令片段和顺序化(Serialization)的指令片段比较执行结果比较,
作者有意思的自我认知:
So how come this bug wasn't found earlier? I think I did a couple of things differently, perhaps with a new perspective as I don't have an EE background.