Research Report: Enhanced eBPF Verification and eBPF-based Runtime Safety Protection

被引:0
|
作者
Jin, Guang [1 ]
Li, Jason [1 ]
Briskin, Greg [1 ]
机构
[1] Trusted Sci & Technol Inc, Rockville, MD 20850 USA
关键词
cybersecurity; formal verification; eBPF; runtime verification;
D O I
10.1109/SPW63631.2024.00026
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The extended Berkeley Packet Filter (eBPF) technology has been extending the capabilities of current Operating Systems (OSs) rapidly in recent years. The eBPF community is wellaware of using formal verification methods to ensure the security of eBPF programs. However, each of the two primary kinds of formal methods, namely abstract interpretation and symbolic execution, comes with their own set of pros and cons. This research report presents our formal eBPF verification approach, which combines the merits of both types of formal methods to ensure soundness, completeness, precision and recall for our solution. This solid security foundation makes eBPF-based applications particularly appealing in the field of cybersecurity. In addition, this research report describes our eBPF-based solution to enhance the runtime security for prebuilt user-space programs. Grounded in a formally provable security foundation, our eBPF-based runtime safety monitoring solution avoids introducing new errors, offers customization to counter various vulnerabilities, and eliminates the need for offline instrumentation.
引用
收藏
页码:224 / 230
页数:7
相关论文
共 50 条
  • [21] SPRIGHT: High-Performance eBPF-Based Event-Driven, Shared-Memory Processing for Serverless Computing
    Qi, Shixiong
    Monis, Leslie
    Zeng, Ziteng
    Wang, Ian-Chin
    Ramakrishnan, K. K.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (03) : 2539 - 2554
  • [22] eBPF/XDP Based Network Traffic Visualization and DoS Mitigation for Intelligent Service Protection
    Choe, YoungEun
    Shin, Jun-Sik
    Lee, Seunghyung
    Kim, JongWon
    ADVANCES IN INTERNET, DATA AND WEB TECHNOLOGIES (EIDWT 2020), 2020, 47 : 458 - 468
  • [23] SPRIGHT: Extracting the Server from Serverless Computing! High-performance eBPF-based Event-driven, Shared-memory Processing
    Qi, Shixiong
    Monis, Leslie
    Zeng, Ziteng
    Wang, Ian-chin
    Ramakrishnan, K. K.
    SIGCOMM '22: PROCEEDINGS OF THE 2022 ACM SIGCOMM 2022 CONFERENCE, 2022, : 780 - 794
  • [24] Security and Safety Threat Detection Method for Unmanned Aerial System Based on Runtime Verification
    Yang D.
    Shi H.
    Dong W.
    Liu Z.-L.
    Zhou G.
    Dong, Wei (wdong@nudt.edu.cn), 2018, Chinese Academy of Sciences (29): : 1360 - 1378
  • [25] Runtime Verification-Based Safe MARL for Optimized Safety Policy Generation for Multi-Robot Systems
    Liu, Yang
    Li, Jiankun
    BIG DATA AND COGNITIVE COMPUTING, 2024, 8 (05)
  • [26] Research on Verification for STPA-Based Avionic System Software Safety
    Sun, Yuan
    Tang, Jingguo
    Yang, Haifeng
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE & APPLICATION TECHNOLOGY (ICCIA 2017), 2017, 74 : 444 - 449
  • [27] Research on Human Falling Protection Performance Based on Safety Net
    Chang, Zongyu
    He, Jingwen
    Hao, Peizheng
    Zheng, Zhongqiang
    2019 PROGNOSTICS AND SYSTEM HEALTH MANAGEMENT CONFERENCE (PHM-QINGDAO), 2019,
  • [28] Research on thermal safety verification code recognition based on SENet and CTC networks
    Huang, Yanglai
    Cui, Pengfei
    Sun, Huixin
    PROCEEDINGS OF 2024 INTERNATIONAL CONFERENCE ON POWER ELECTRONICS AND ARTIFICIAL INTELLIGENCE, PEAI 2024, 2024, : 468 - 473
  • [29] Application Research of Rail Transit Safety Protection Based on Laser Detection
    Wang Zhifei
    ADVANCED LASER MANUFACTURING TECHNOLOGY, 2016, 10153
  • [30] Research on crossing safety protection system based on adaptive Radar Technology
    Luan, Qiu-ping
    Song, Wei
    Li, Wen-xiu
    Li, Ying
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON ADVANCED MATERIALS FOR SCIENCE AND ENGINEERING (IEEE-ICAMSE 2016), 2016, : 467 - 470