Extended berkeley packet filter: An application perspective

H Sharaf, I Ahmad, T Dimitriou - IEEE Access, 2022 - ieeexplore.ieee.org
The extended Berkeley Packet Filter (eBPF) is a lightweight and fast 64-bit RISC-like virtual
machine (VM) inside the Linux kernel. eBPF has emerged as the most promising and de …

Verus: A practical foundation for systems verification

A Lattuada, T Hance, J Bosamiya, M Brun… - Proceedings of the …, 2024 - dl.acm.org
Formal verification is a promising approach to eliminate bugs at compile time, before they
ship. Indeed, our community has verified a wide variety of system software. However, much …

Cross Container Attacks: The Bewildered {eBPF} on Clouds

Y He, R Guo, Y **ng, X Che, K Sun, Z Liu… - 32nd USENIX Security …, 2023 - usenix.org
The extended Berkeley Packet Filter (eBPF) provides powerful and flexible kernel interfaces
to extend the kernel functions for user space programs via running bytecode directly in the …

{BeeBox}: Hardening {BPF} against Transient Execution Attacks

D **, AJ Gaidis, VP Kemerlis - 33rd USENIX Security Symposium …, 2024 - usenix.org
The Berkeley Packet Filter (BPF) has emerged as the de-facto standard for carrying out safe
and performant, user-specified computation (s) in kernel space. However, BPF also …

Validating JIT Compilers via Compilation Space Exploration

C Li, Y Jiang, C Xu, Z Su - Proceedings of the 29th Symposium on …, 2023 - dl.acm.org
This paper introduces the novel concept of compilation space, which facilitates the thorough
validation of just-in-time (JIT) compilers in modern language virtual machines (LVMs). The …

Programmable system call security with ebpf

J Jia, YF Zhu, D Williams, A Arcangeli… - arxiv preprint arxiv …, 2023 - arxiv.org
System call filtering is a widely used security mechanism for protecting a shared OS kernel
against untrusted user applications. However, existing system call filtering techniques either …

Kernel extension verification is untenable

J Jia, R Sahu, A Oswald, D Williams, MV Le… - Proceedings of the 19th …, 2023 - dl.acm.org
The emergence of verified eBPF bytecode is ushering in a new era of safe kernel
extensions. In this paper, we argue that eBPF's verifier---the source of its safety guarantees …

Validating the {eBPF} verifier via state embedding

H Sun, Z Su - 18th USENIX Symposium on Operating Systems …, 2024 - usenix.org
This paper introduces state embedding, a novel and highly effective technique for validating
the correctness of the eBPF verifier, a critical component for Linux kernel security. To check …

NetEdit: An Orchestration Platform for eBPF Network Functions at Scale

TA Benson, P Kannan, P Gupta, B Madhavan… - Proceedings of the …, 2024 - dl.acm.org
Managing the performance of thousands of services across millions of servers demands a
networking stack that can dynamically adjust protocol settings to match diverse priorities and …

Blueswat: A lightweight state-aware security framework for bluetooth low energy

X Che, Y He, X Feng, K Sun, K Xu, Q Li - … of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Bluetooth Low Energy (BLE) is a short-range wireless communication technology for
resource-constrained IoT devices. Unfortunately, BLE is vulnerable to session-based …