Fuzz4cuda: Fuzzing Your Nvidia Gpu Libraries Through Debug Interface
Sichuan University
SSRN 5399792, 2025
@article{zhou5399792fuzz4cuda,
title={Fuzz4cuda: Fuzzing Your Nvidia Gpu Libraries Through Debug Interface},
author={Zhou, Yuhao and Jia, Peng and Liu, Jiayong and Fan, Ximing},
journal={Available at SSRN 5399792}
}
The programming security of Compute Unified Device Architecture(CUDA), NVIDIA’s parallel computing platform and programming model for Graphics Processing Unit, has always been a significant concern. On the host-side, fuzzing has been remarkably successful at uncovering various software bugs and vulnerabilities, with hundreds of flaws discovered annually through different fuzzing tools. However, existing fuzzing tools typically operate on general-purpose CPU architectures and embedded system. As an independent processing unit, the GPU does not support tools like American Fuzzy Lop for collecting instrumentation and code coverage information. Consequently, gray-box fuzzing for closed-source graphics and driver libraries has remained an unaddressed challenge.This research introduces Fuzz4Cuda, a universal fuzzing framework specifically designed for GPU libraries. To enhance device-side coverage collection, Fuzz4Cuda achieved this by runtime analysis of CUDA Streaming Assembler. Furthermore, the framework could dynamically adjust the number of breakpoints to optimize test case execution speed, thereby accelerating the overall time to discover program crash inputs. The development of Fuzz4Cuda has moved GPU library fuzzing ahead, aiming to improve the security of the GPU programming environment. During a month-long experimental period, our evaluation of the CUDA Toolkit library led to the discovery of five real-world bugs, four of which have been assigned CVE IDs.
August 24, 2025 by hgpu
Your response
You must be logged in to post a comment.