[HTML][HTML] WebAssembly and Security: a review

G Perrone, SP Romano - Computer Science Review, 2025‏ - Elsevier
WebAssembly is revolutionizing the approach to develo** modern applications. Although
this technology was born to create portable and performant modules in web browsers …

Taking 5G RAN analytics and control to a new level

X Foukas, B Radunovic, M Balkwill, Z Lai - Proceedings of the 29th …, 2023‏ - dl.acm.org
Open RAN, a modular and disaggregated design paradigm for 5G radio access networks
(RAN), promises programmability through the RAN Intelligent Controller (RIC). However …

Cross container attacks: The bewildered {eBPF} on clouds

Y He, R Guo, Y **ng, X Che, K Sun, Z Liu… - 32nd USENIX Security …, 2023‏ - usenix.org
The extended Berkeley Packet Filter (eBPF) provides powerful and flexible kernel interfaces
to extend the kernel functions for user space programs via running bytecode directly in the …

{BMC}: Accelerating memcached using safe in-kernel caching and pre-stack processing

Y Ghigoff, J Sopena, K Lazri, A Blin… - 18th USENIX Symposium …, 2021‏ - usenix.org
In-memory key-value stores are critical components that help scale large internet services by
providing low-latency access to popular data. Memcached, one of the most popular key …

Kernel extension verification is untenable

J Jia, R Sahu, A Oswald, D Williams, MV Le… - Proceedings of the 19th …, 2023‏ - dl.acm.org
The emergence of verified eBPF bytecode is ushering in a new era of safe kernel
extensions. In this paper, we argue that eBPF's verifier---the source of its safety guarantees …

Verifying the verifier: ebpf range analysis verification

H Vishwanathan, M Shachnai, S Narayana… - … on Computer Aided …, 2023‏ - Springer
This paper proposes an automated method to check the correctness of range analysis used
in the Linux kernel's eBPF verifier. We provide the specification of soundness for range …

Userspace bypass: Accelerating syscall-intensive applications

Z Zhou, Y Bi, J Wan, Y Zhou, Z Li - 17th USENIX Symposium on …, 2023‏ - usenix.org
Context switching between kernel mode and user mode often causes prominent overhead,
which slows down applications with frequent system calls (or syscalls), eg, those with high …

Programmable system call security with ebpf

J Jia, YF Zhu, D Williams, A Arcangeli… - arxiv preprint arxiv …, 2023‏ - arxiv.org
System call filtering is a widely used security mechanism for protecting a shared OS kernel
against untrusted user applications. However, existing system call filtering techniques either …

Validating the {eBPF} verifier via state embedding

H Sun, Z Su - 18th USENIX Symposium on Operating Systems …, 2024‏ - usenix.org
This paper introduces state embedding, a novel and highly effective technique for validating
the correctness of the eBPF verifier, a critical component for Linux kernel security. To check …

An analysis of speculative type confusion vulnerabilities in the wild

O Kirzner, A Morrison - 30th USENIX Security Symposium (USENIX …, 2021‏ - usenix.org
Spectre v1 attacks, which exploit conditional branch misprediction, are often identified with
attacks that bypass array bounds checking to leak data from a victim's memory. Generally …