This branch is evaluation version of Host-based Firmware Analyzer (HBFA).
This branch owner: Jiewen Yao <jiewen.yao@intel.com>, Chris Wu <chris.wu@intel.com>, Wei Liu <wei3.liu@intel.com>
Computer platform firmware is a critical element in the root-of-trust. Firmware developers need a robust tool set to analyze and test firmware components, enabling detection of security issues prior to platform integration and helping to reduce validation costs. HBFA allows developers to run open source advanced tools, such as fuzz testing, symbolic execution, and address sanitizers in a system environment.
- GUI and command-line interfaces
- Execute common fuzzing frameworks (AFL, libFuzzer, Peach)
- Supports symbolic execution (KLEE/STP)
- Incorporates Address Sanitizer
- Unit test execution via Cunit/Cmocka/Host directly
- Generate code coverage report (GCOV/LCOV in Linux, DynamoRIO in Windows)
- Instrumentation methods for fault injection and trace
- Database of unit test cases
- Test reports with extended stack trace information
- Windows support
-
Setup EDKII environment
- Please refer to https://github.com/tianocore/tianocore.github.io/wiki/Getting-Started-with-EDK-II and setup EDKII Environment.
- Get EDKII repository with submodule openssl.
$ git clone https://github.com/tianocore/edk2.git --recursive
NOTE: if you have already downloaded EDKII, you can manually initialize and update the submodules after the clone operation on main project:
$ cd edk2
$ git submodule update --init --recursive
- Compile the BaseTools, please open Terminal/Command prompt in edk2 folder and type below command.
In Linux
$ make -C BaseTools
In Windows
$ edksetup.bat Rebuild
-
Setup HBFA environment
- checkout the HBFA branch.
$ git clone https://github.com/tianocore/edk2-staging.git
$ cd edk2-staging
$ git checkout -b HBFA origin/HBFA
- checkout the HBFA branch.
-
Setup Workspace for build
- Add HBFA path into PACKAGES_PATH when build tree with HBFA.
Example:
In Linux
$ export WORKSPACE=~/workspace
$ export PACKAGES_PATH=$WORKSPACE/edk2-staging/HBFA:$WORKSPACE/edk2
In Windows
$ set WORKSPACE=c:\workspace
$ set PACKAGES_PATH=%WORKSPACE%/edk2-staging/HBFA;%WORKSPACE%/edk2
Note: In Windows, you may meet build error if the PACKAGES_PATH for HBFA is too long. You can useSubst
to shorten HBFA path to a virtual disk and set PACKAGES_PATH for HBFA to that virtual disk. - Run
edksetup.sh/edksetup.bat
under EDKII source code tree. (NOTE: VS environment should be enabled in Windows.) Example:
In Linux
$ edk2/edksetup.sh
In Windows
$ set WORKSPACE=c:\workspace
$ set PACKAGES_PATH=%WORKSPACE%/edk2-staging/HBFA;%WORKSPACE%/edk2
NOTE: Workspace need to be set every time you reopen Terminal/Command prompt when you want to build test binary.
- Add HBFA path into PACKAGES_PATH when build tree with HBFA.
-
Do fuzzing test
- How to run AFL in OS?
Please refer toHBFA/UefiHostFuzzTestPkg/ReadMe-AFL.txt
. - How to run KLEE in OS (Linux only)?
Please refer toHBFA/UefiHostFuzzTestPkg/ReadMe-KLEE.txt
. - How to run Peach in OS?
Please refer toHBFA/UefiHostFuzzTestPkg/ReadMe-Peach.txt
. - How to run LibFuzzer in OS?
Please refer toHBFA/UefiHostFuzzTestPkg/ReadMe-LibFuzzer.txt
. - How to use instrumentation methods in OS?
Please refer toHBFA/UefiHostFuzzTestPkg/ReadMe-ErrorInjection.txt
.
- How to run AFL in OS?
-
Do unit test
- How to run cmocka for UEFI code?
Please refer toHBFA/UefiHostUnitTestPkg/ReadMe-cmocka.txt
. - How to run HOST for UEFI code?
Example:
Build in Linux
build -p UefiHostUnitTestCasePkg/UefiHostUnitTestCasePkg.dsc -a X64 -t GCC5 -DUNIT_TEST_FRAMEWORK_MODE=HOST
<...>/Build/UefiHostUnitTestCasePkg/DEBUG_GCC5/X64/TestBaseSafeIntLib
Build in Windows
build -p UefiHostUnitTestCasePkg/UefiHostUnitTestCasePkg.dsc -a X64 -t VS2015x86 -DUNIT_TEST_FRAMEWORK_MODE=HOST
<...>\Build\UefiHostUnitTestCasePkg\DEBUG_VS2015x86\X64\TestBaseSafeIntLib.exe
- How to run cmocka for UEFI code?
-
Get code coverage
Please refer toHBFA/UefiHostUnitTestPkg/ReadMe-Coverage.txt
. -
Add new case
please refer to [HBFA/Doc/User Guide - How to Add New Case.pdf
](HBFA/Doc/User Guide - How to Add New Case.pdf).
Time | Event |
---|---|
2019 April | Evaluation version |