Skip to content

kth-step/HolBA

Repository files navigation

HolBA - Binary analysis in HOL

Build Status

HolBA is a library based on the HOL4 theorem prover that provides tools for analysis and formal proofs of properties of programs in binary format that use the ARMv8, RISC-V and Cortex-M0 instruction sets.

Building

HolBA is built using the Holmake tool bundled with HOL4.

Dependencies

  • HOL4, tag trindemossen-1.
  • Poly/ML, 5.9.1
    • alternatively, Poly/ML 5.7.1 (version packaged for Ubuntu 20.04)
  • Z3, 4.8.4

Build using existing HOL4 installation

If you already have HOL4 installed and Holmake in your path, you can do the following to build the whole library, excluding examples:

git clone https://github.com/kth-step/HolBA.git
cd HolBA
Holmake

To build examples, you need to set the path to the Z3 binary and then run Holmake in the examples directory:

export HOL4_Z3_EXECUTABLE=/path/to/z3
cd examples
Holmake

Build from scratch

For convenience, HolBA provides some scripts to bootstrap an environment with HOL4 and Z3 from a bash shell.

git clone https://github.com/kth-step/HolBA.git
cd HolBA

# This sets up all dependencies in this HolBA
# directory (${HOLBA_DIR}/opt). It downloads and
# builds polyml and HOL4 for example.
./scripts/setup/install_all.sh

# In order to create a configuration file with
# the directories for the installed tools,
# execute the following line
./configure.sh

# For convenience and indepence of make, this command
# augments the environment with ${HOLBA_*} variables
# as well as the ${PATH} variable. Now calls to Holmake
# use the installed instance of HOL4 in the opt directory.
# Furthermore, some tools require these variables to
# run properly. It has to be run for each new shell.
source env.sh

# This builds the whole library, excluding examples
${HOLBA_HOLMAKE}

# This builds the examples
cd examples
${HOLBA_HOLMAKE}

Library organization

Directory structure

  • doc: Documentation about HolBA and BIR
  • examples: Applications of HolBA
    • aes: lifting + WP of an AES block cipher implementation on ARMv8 and Cortex-M0
    • bsl-wp-smt: Small BIR example programs to test simplified BIR generation, WP propagation and SMT interface
    • ijr: Theory and examples related to indirect jumps
    • nic: Network interface controller formalization
    • riscv: Examples of specifying and verifying RISC-V programs
    • tutorial: End-to-end tutorial of simple ARMv8 example programs
  • scripts: CI and installation scripts
  • src: Library sources
    • extra: General theories and libraries
    • shared: Libraries shared between tools
    • theory: Domain-specific theories
      • bir: Core BIR language
      • bir-support: Extensions and supporting theories for BIR
      • models: Additional machine models
      • program_logic: Abstract Hoare-style logic for unstructured code
      • tools: Theories for the tool libraries in src/tools
    • tools: Domain-specific libraries
      • backlifter: Utilities for obtaining ISA-level contracts from BIR contracts
      • cfg: Control flow graph utilities
      • comp: Composition of contracts
      • compute: Utilities for using cv_compute in HOL4
      • exec: Concrete execution
      • lifter: Translation from binary ISA code to BIR
      • pass: Passification utility
      • scamv: Abstract side channel model validation framework
      • wp: Weakest precondition propagation

Tool status

  • tools/backlifter:
    • Proof-producing
    • Clear interface
    • Experimental implementation
  • tools/cfg:
    • Non-proof-producing
    • No clear interface yet
    • GraphViz exporter working
  • tools/comp:
    • Proof-producing
    • Decent interface
    • Experimental implementation
    • Requires documentation
  • tools/exec:
    • Proof-producing
    • Unstable BIR evaluation utilities (no clear interface yet)
    • Quite easy to use
  • tools/lifter:
    • Proof-producing
    • Stable
    • Widely used in examples
    • Supports: ARMv8, Cortex-M0, Cortex-M0 with clock cycle counter, RISC-V
  • tools/pass:
    • Non-proof-producing
    • Experimental passification transformation to SSA
  • tools/scamv:
    • Works for small programs
    • Includes a selection of cache side channel models
  • tools/wp:
    • Proof-producing
    • Interface in progress
    • Fairly stable
    • Includes prototype of substitution simplification

Using HolBA in your HOL4-based project

To depend on HolBA in a project based on HOL4, we recommend setting up your project to build using Holmake, and then adding references in your Holmakefile to the directories where the modules from HolBA that you use reside in, relative to the variable HOLBADIR.

For example, if you depend on modules in the src/theory/bir and src/theory/bir-support directories, your Holmakefile may be as follows:

INCLUDES = $(HOLBADIR)/src/theory/bir $(HOLBADIR)/src/theory/bir-support

all: $(DEFAULT_TARGETS)
.PHONY: all

To then build your project, you can export the path to your copy of the HolBA repository and run Holmake in the directory with your Holmakefile, which will recursively build all required theories:

export HOLBADIR=/path/to/holba
Holmake

Bug reports

Please report any bug or feature request in the issue tracker.

Contributing

Contributions such as new features and bugfixes are welcome as pull requests, but be sure to read the contribution guide before submitting them.

Related publications

  • D. Lundberg, R. Guanciale, A. Lindner and M. Dam, "Hoare-Style Logic for Unstructured Programs", in Software Engineering and Formal Methods, pp. 193-213, 2020. Link. (program logic used for decomposition of verification)
  • H. Nemati, P. Buiras, A. Lindner, R. Guanciale and S. Jacobs, "Validation of Abstract Side-Channel Models for Computer Architectures", in International Conference on Computer Aided Verification, pp. 225-248, 2020. Link. (framework to validate abstract side-channel models)
  • A. Lindner, R. Guanciale and R. Metere, "TrABin : Trustworthy analyses of binaries", Science of Computer Programming, vol. 174, pp. 72-89, 2019. Link. (the proof-producing binary analysis framework with weakest preconditions in HOL4)
  • D. Lundberg, "Provably Sound and Secure Automatic Proving and Generation of Verification Conditions", Master Thesis, 2018. Link.
  • R. Metere, A. Lindner and R. Guanciale, "Sound Transpilation from Binary to Machine-Independent Code", in 20th Brazilian Symposium on Formal Methods, pp. 197-214, 2017. Link. (formalization of intermediate language and proof-producing lifter in HOL4)