Understanding the Security of Linux eBPF Subsystem

被引:1
|
作者
Mohamed, Mohamed Husain Noor [1 ]
Wang, Xiaoguang [2 ]
Ravindran, Binoy [1 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Univ Illinois, Chicago, IL USA
基金
美国国家科学基金会;
关键词
Linux eBPF; Kernel Security; Fuzzing;
D O I
10.1145/3609510.3609822
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Linux eBPF allows a userspace application to execute code inside the Linux kernel without modifying the kernel code or inserting a kernel module. An in-kernel eBPF verifier preverifies any untrusted eBPF bytecode before running it in kernel context. Currently, users trust the verifier to block malicious bytecode from being executed. This paper studied the potential security issues from existing eBPF-related CVEs. Next, we present a generation-based eBPF fuzzer that generates syntactically and semantically valid eBPF programs to find bugs in the verifier component of the Linux kernel eBPF subsystem. The fuzzer extends the Linux Kernel Library (LKL) project to run multiple lightweight Linux instances simultaneously, with inputs from the automatically generated eBPF instruction sequences. Using this fuzzer, we can outperform the bpf-fuzzer [10] from the iovisor GitHub repository regarding fuzzing speed and the success rate of passing the eBPF verifier (valid generated code). We also found two existing ALU range-tracking bugs that appeared in an older Linux kernel (v5.10).
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
  • [31] Understanding Linux kernel vulnerabilities
    Alireza Shameli-Sendi
    Journal of Computer Virology and Hacking Techniques, 2021, 17 : 265 - 278
  • [32] Understanding Linux kernel vulnerabilities
    Shameli-Sendi, Alireza
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2021, 17 (04) : 265 - 278
  • [33] Insight into the Security Issues in IP Multimedia Subsystem
    Li Yang
    Fang Guibin
    CHINA COMMUNICATIONS, 2010, 7 (01) : 108 - 114
  • [34] UGV: security analysis of subsystem control network
    Abbott-McCune, Sam
    Kobezak, Philip
    Tront, Joseph
    Marchany, Randy
    Wicks, Al
    UNMANNED SYSTEMS TECHNOLOGY XV, 2013, 8741
  • [35] Trusted path execution for the Linux 2.6 kernel as a Linux Security Module
    Rahimi, NA
    USENIX ASSOCIATION PROCEEDINGS OF THE FREENIX TRACK 2004 USENIX ANNUAL TECHNICAL CONFERENCE, 2004, : 73 - 80
  • [36] USB Security Camera Software for Linux
    Weerachai, J.
    Siam, P.
    Narawith, K.
    2ND INTERNATIONAL SCIENCE, SOCIAL SCIENCE, ENGINEERING AND ENERGY CONFERENCE 2010 (I-SEEC 2010), 2011, 8 : 171 - 176
  • [37] Quantifying the Security Profile of Linux Applications
    Androutsopoulos, G. C.
    Kappes, Giorgos
    Anastasiadis, Stergios, V
    PROCEEDINGS OF THE 14TH ACM SIGOPS ASIA-PACIFIC WORKSHOP ON SYSTEMS, APSYS 2023, 2023, : 80 - 86
  • [38] Security Analysis of Access Linux Platform
    Sjoestroem, Andreas
    Fukushima, Kazuhide
    Kiyomoto, Shinsaku
    Shin, Wook
    Tanaka, Toshiaki
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (05): : 12 - 18
  • [39] The Study of Access Mechanism for the Security of Linux
    Wang ChengJiong
    INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS RESEARCH, 2013, 422 : 176 - 180
  • [40] Encrypted watermarks and Linux laptop security
    Saarinen, MJO
    INFORMATION SECURITY APPLICATIONS, 2005, 3325 : 27 - 38