Skip to content

Fuzzing processor simulations with taint tracking.

Notifications You must be signed in to change notification settings

vusec/phantom-trails

Repository files navigation

Phantom Trails

Fuzzing processor simulations with (software) taint tracking.

More information in the paper (USENIX Security '25).

Quick Start

First, clone the repository and all its submodules.

git clone git@github.com:vusec/phantom-trails.git
cd phantom-trails
git submodule update --init --recursive

Next, build the container (takes ~40min on a 48 cores/128GB RAM machine) and start a fish shell inside it:

cd BOOM
./start.py shell

Note: this is equivalent to the start.sh script mentioned in the paper's Artifact Appendix.

Evaluation and Usage

To run fuzzing campaigns and reproduce the results reported in our paper, you can check the evaluation doc page.

For more advanced usage of the tool, you can check the dedicated doc page.

Troubleshooting

MemorySanitizer can not mmap the shadow memory

If you get a runtime error like:

FATAL: Code XXXX is out of application range. Non-PIE build?
FATAL: MemorySanitizer can not mmap the shadow memory.
[...]

This is caused by a known MSAN issue with ASLR, which should be fixed by our implementation. If this still happens on your machine, you can either:

  1. reduce vm.mmap_rnd_bits (e.g. sudo sysctl vm.mmap_rnd_bits=28 instead of 32)
  2. or disable ASLR completely (e.g. echo 0 | sudo tee /proc/sys/kernel/randomize_va_space)
RISCV toolchain is not found inside of the container

If you get errors like this:

*** RISCV is unset. Did you source the Chipyard auto-generated env file?

You need to make sure /chipyard/env.sh is sourced (from a bash shell).

Docker build exits prematurely

It is highly likely that building LLVM saturated the available memory. Try reducing the number of building and linking jobs: replace nproc in BOOM/start.sh with a lower number.

How do I kill the fuzzer?

When running inside of the TUI, Ctrl^C might not work. You can kill the fuzzer with killall sim-fuzzer && killall run-FuzzConfig

Repo Structure

.
├── AFL      # Our AFL++ fork with coverage metrics.
├── ArchSim/ # Spike (ISA simulator) + wrapper.
├── BOOM/    # Our target.
│   ├── boom-wrapper/  # C++ harness, init code, ...
│   ├── results/       # Fuzzing results are saved here.
│   ├── scripts/       # Contains `phantom-trails` script.
│   ├── shared/        # Shared with the container.
│   └── start.py       # Entrypoint script
├── docs     # Documentation.
├── Fuzzer   # libAFL fuzzer.
├── llvm     # Our LLVM fork with BFSAN.
└── Samples  # PoCs and Spectre-LP docs.

More details can be found in the components doc page.

About

Fuzzing processor simulations with taint tracking.

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors 3

  •  
  •  
  •