[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Testing boot loaders



On 02/28/2017 11:38 AM, Mark Morgan Lloyd wrote:
[...]
> Is it possible to use Qemu or some comparable emulator to check the boot
> sequence in situ, i.e. without breaking the U-Boot and kernel images out
> into separate files?

There are a few tools which take embedded Linux/Android disk images, run
QEMU to emulate the missing hardware, and then attack it with whatever
they can. Maybe one of those tools can help you with your boot sequence
needs? Below are a few, there are others that I'm forgetting the names
of, these will probably help you search for the ones I'm forgetting. :-)
Sorry, unsure if there is an option that will work with U-Boot and
Debian and ARM. (I haven't worked much with these tools, instead focus
on UEFI/ACPI 'blobs'.)


https://firmwaresecurity.com/2016/02/28/firmadyne-automated-analysis-of-linux-embedded-firmware/

https://firmwaresecurity.com/2015/09/23/costins-embedded-firmware-security-thesis/

https://firmwaresecurity.com/2015/11/23/panda-vm/

https://firmwaresecurity.com/2016/08/25/firminator/

https://firmwaresecurity.com/2016/02/28/firmadyne-automated-analysis-of-linux-embedded-firmware/

You might also try asking on Twitter, on the firmware-security list.
https://twitter.com/JacobTorrey/lists/firmware-security
https://firmwaresecurity.com/2017/01/17/firmware-security-list-on-twitter/

Also, I've not tried it for this purpose, but perhaps S2E/Avatar has
some features that might help you.
http://www.s3.eurecom.fr/tools/avatar/

HTH,
Lee


Reply to: