What is it about?
MileSan is an RTL sanitizer that detects arbitrary exploitable information leakage by checking for the architecturally-observable differences between architectural and microarchitectural information flows. We built RandOS, a fuzzer that employs MileSan for program generation and leakage detection, and found 19 new leakages (of which 13 were assigned CVEs) across 5 RISC-V CPUs. Below is a video of RandOS discovering leakage using MileSan:
Featured Image
Why is it important?
Pre-silicon vulnerability discovery lacks generic methods that can detect arbitrary vulnerabilities. Many vulnerabilities are therefore only discovered after CPUs have already been shipped, resulting in mitigations at the software- of microcode-level that incur substantial performance overheads.
Read the Original
This page is a summary of: MileSan: Detecting Exploitable Microarchitectural Leakage via Differential Hardware-Software Taint Tracking, November 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3719027.3765066.
You can read the full text:
Contributors
The following have contributed to this page







