Programmable system call security with ebpf

J Jia, YF Zhu, D Williams, A Arcangeli… - arxiv preprint arxiv …, 2023 - arxiv.org
System call filtering is a widely used security mechanism for protecting a shared OS kernel
against untrusted user applications. However, existing system call filtering techniques either …

On the value of sequence-based system call filtering for container security

S Song, S Suneja, MV Le, B Tak - 2023 IEEE 16th International …, 2023 - ieeexplore.ieee.org
One critical attack that exploits kernel vulnerabilities through system call invocations is
considered a serious threat to container security since it results in the privilege escalation …

[PDF][PDF] Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall Sequences

H Kermabon-Bobinnec, Y Jarraya… - Proceedings of the …, 2024 - ndss-symposium.org
Phoenix: Surviving Unpatched Vulnerabilities via Accurate and Efficient Filtering of Syscall
Sequences Page 1 Hugo Kermabon-Bobinnec* Yosr Jarraya † , Lingyu Wang*, Suryadipta …

B-Side: Binary-Level Static System Call Identification

G Thévenon, K Nguetchouang, K Lazri… - Proceedings of the 25th …, 2024 - dl.acm.org
System call filtering is widely used to secure programs in multi-tenant environments, and to
sandbox applications in modern desktop software deployment and package management …

One System Call Hook to Rule All TEE OSes in the Cloud

K Qin, D Gu - 2024 IEEE 17th International Conference on …, 2024 - ieeexplore.ieee.org
Confidential computing has revolutionized the way of in-use data protection in the Cloud,
using the concept of Trusted Execution Environments (TEEs). Emerging from this paradigm …

[PDF][PDF] Hardware Extensions and Compiler Support for Protection Against Fault Attacks

S Mangard - 2023 - rschilling.net
Software is ubiquitous in all applications of modern lives. The correct execution of software
is essential for the functionality and security of the underlying device. Fault attacks …

[PDF][PDF] Hardening the Kernel Against Unprivileged Attacks

C Canella - 2022 - cc0x1f.net
Modern computer systems play a significant role in our everyday life. An essential part of
these systems is the privileged Operating System (OS), which performs specific tasks for less …

[PDF][PDF] Warden: Multi-Layered Control Flow Integrity in Web Applications

K Shah - 2023 - digital.wpi.edu
This research introduces Warden, a function-level control flow enforcement for web
applications. The goal of Warden is to strengthen the security of the Single Use-Server …

[PDF][PDF] Go With the Flow: Enforcing Program Behavior Through Syscall Sequences and Origins

C Canella - i.blackhat.com
As the number of vulnerabilities continues to increase every year, we require more and more
methods of constraining the applications that run on our systems. Control-Flow Integrity …

[PDF][PDF] Know Where You Come From

C Canella - 2022 - qualcomm.com
Know Where You Come From Page 1 Know Where You Come From Enforcing Program
Behavior Through Syscall Sequences and Origins Claudio Canella May 19, 2022 Graz …