This document discusses using American Fuzzy Lop (AFL) to find vulnerabilities in virtualized devices. It describes their approach of customizing a BIOS to instrument targets and control devices. It outlines the workflow which includes instrumenting targets, encoding commands as input for AFL, running the fuzzing loop, and having the Operation Proxy Server execute requests. As a case study, it discusses fuzzing a floppy disk controller to reproduce the Venom vulnerability. It provides tips for instrumenting code and handling multiple processes with AFL.