Skip to content

HBFA fuzzer fork for the HARDEN project

Notifications You must be signed in to change notification settings

ucsb-seclab/harden-HBFA

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

60 Commits
 
 
 
 
 
 

Repository files navigation

Introduction

This branch is evaluation version of Host-based Firmware Analyzer (HBFA).
This branch owner: Jiewen Yao <[email protected]>, Chris Wu <[email protected]>, Wei Liu <[email protected]>

Computer platform firmware is a critical element in the root-of-trust. Firmware developers need a robust tool set to analyze and test firmware components, enabling detection of security issues prior to platform integration and helping to reduce validation costs. HBFA allows developers to run open source advanced tools, such as fuzz testing, symbolic execution, and address sanitizers in a system environment.


Supported Features

  • GUI and command-line interfaces
  • Execute common fuzzing frameworks (AFL, libFuzzer, Peach)
  • Supports symbolic execution (KLEE/STP)
  • Incorporates Address Sanitizer
  • Unit test execution via Cunit/Cmocka/Host directly
  • Generate code coverage report (GCOV/LCOV in Linux, DynamoRIO in Windows)
  • Instrumentation methods for fault injection and trace
  • Database of unit test cases
  • Test reports with extended stack trace information
  • Windows support

How to use HBFA

  1. Setup EDKII environment

    1. Please refer to https://github.com/tianocore/tianocore.github.io/wiki/Getting-Started-with-EDK-II and setup EDKII Environment.
    2. Get EDKII repository with submodule openssl.
      $ git clone https://github.com/tianocore/edk2.git --recursive
      NOTE: if you have already downloaded EDKII, you can manually initialize and update the submodules after the clone operation on main project:
      $ cd edk2
      $ git submodule update --init --recursive
    3. Compile the BaseTools, please open Terminal/Command prompt in edk2 folder and type below command.
      In Linux
      $ make -C BaseTools
      In Windows
      $ edksetup.bat Rebuild
  2. Setup HBFA environment

    1. checkout the HBFA branch.
      $ git clone https://github.com/tianocore/edk2-staging.git
      $ cd edk2-staging
      $ git checkout -b HBFA origin/HBFA
  3. Setup Workspace for build

    1. Add HBFA path into PACKAGES_PATH when build tree with HBFA.
      Example:
      In Linux
      $ export WORKSPACE=~/workspace
      $ export PACKAGES_PATH=$WORKSPACE/edk2-staging/HBFA:$WORKSPACE/edk2
      In Windows
      $ set WORKSPACE=c:\workspace
      $ set PACKAGES_PATH=%WORKSPACE%/edk2-staging/HBFA;%WORKSPACE%/edk2
      Note: In Windows, you may meet build error if the PACKAGES_PATH for HBFA is too long. You can use Subst to shorten HBFA path to a virtual disk and set PACKAGES_PATH for HBFA to that virtual disk.
    2. Run edksetup.sh/edksetup.bat under EDKII source code tree. (NOTE: VS environment should be enabled in Windows.) Example:
      In Linux
      $ edk2/edksetup.sh
      In Windows
      $ set WORKSPACE=c:\workspace
      $ set PACKAGES_PATH=%WORKSPACE%/edk2-staging/HBFA;%WORKSPACE%/edk2
      NOTE: Workspace need to be set every time you reopen Terminal/Command prompt when you want to build test binary.
  4. Do fuzzing test

  5. Do unit test

    • How to run cmocka for UEFI code?
      Please refer to HBFA/UefiHostUnitTestPkg/ReadMe-cmocka.txt.
    • How to run HOST for UEFI code?
      Example:
      Build in Linux
      build -p UefiHostUnitTestCasePkg/UefiHostUnitTestCasePkg.dsc -a X64 -t GCC5 -DUNIT_TEST_FRAMEWORK_MODE=HOST
      <...>/Build/UefiHostUnitTestCasePkg/DEBUG_GCC5/X64/TestBaseSafeIntLib
      Build in Windows
      build -p UefiHostUnitTestCasePkg/UefiHostUnitTestCasePkg.dsc -a X64 -t VS2015x86 -DUNIT_TEST_FRAMEWORK_MODE=HOST
      <...>\Build\UefiHostUnitTestCasePkg\DEBUG_VS2015x86\X64\TestBaseSafeIntLib.exe
  6. Get code coverage
    Please refer to HBFA/UefiHostUnitTestPkg/ReadMe-Coverage.txt.

  7. Add new case
    please refer to [HBFA/Doc/User Guide - How to Add New Case.pdf](HBFA/Doc/User Guide - How to Add New Case.pdf).


Timeline

Time Event
2019 April Evaluation version

Related Materials

About

HBFA fuzzer fork for the HARDEN project

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • C 88.9%
  • Python 7.9%
  • HTML 1.8%
  • Assembly 1.2%
  • Other 0.2%