Understanding the Security of Linux eBPF Subsystem

被引:1
|
作者
Mohamed, Mohamed Husain Noor [1 ]
Wang, Xiaoguang [2 ]
Ravindran, Binoy [1 ]
机构
[1] Virginia Tech, Blacksburg, VA 24061 USA
[2] Univ Illinois, Chicago, IL USA
基金
美国国家科学基金会;
关键词
Linux eBPF; Kernel Security; Fuzzing;
D O I
10.1145/3609510.3609822
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Linux eBPF allows a userspace application to execute code inside the Linux kernel without modifying the kernel code or inserting a kernel module. An in-kernel eBPF verifier preverifies any untrusted eBPF bytecode before running it in kernel context. Currently, users trust the verifier to block malicious bytecode from being executed. This paper studied the potential security issues from existing eBPF-related CVEs. Next, we present a generation-based eBPF fuzzer that generates syntactically and semantically valid eBPF programs to find bugs in the verifier component of the Linux kernel eBPF subsystem. The fuzzer extends the Linux Kernel Library (LKL) project to run multiple lightweight Linux instances simultaneously, with inputs from the automatically generated eBPF instruction sequences. Using this fuzzer, we can outperform the bpf-fuzzer [10] from the iovisor GitHub repository regarding fuzzing speed and the success rate of passing the eBPF verifier (valid generated code). We also found two existing ALU range-tracking bugs that appeared in an older Linux kernel (v5.10).
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
  • [41] The seven deadly sins of Linux security
    Horizon Network Security
    Queue, 2007, 4 (38-47): : 38 - 47
  • [42] Security Namespace : Making Linux Security Frameworks Available to Containers
    Sun, Yuqiong
    Safford, David
    Zohar, Mimi
    Pendarakis, Dimitrios
    Gu, Zhongshu
    Jaeger, Trent
    PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, 2018, : 1423 - 1439
  • [43] REGIONAL SECURITY OF THE NORTHERN CAUCASUS AS A SUBSYSTEM OF RUSSIAN NATIONAL SECURITY: POLITOLOGICAL ASPECT
    Kutilin, S. A.
    VOLGOGRADSKII GOSUDARSTVENNYI UNIVERSITET-VESTNIK-SERIYA 4-ISTORIYA REGIONOVEDENIE MEZHDUNARODNYE OTNOSHENIYA, 2010, 15 (02): : 155 - 158
  • [44] Detecting Cryptojacking Containers Using eBPF-Based Security Runtime and Machine Learning
    Kim, Riyeong
    Ryu, Jeongeun
    Kim, Sumin
    Lee, Soomin
    Kim, Seongmin
    ELECTRONICS, 2025, 14 (06):
  • [45] Experimental Performance Evaluation of a Hybrid Packet Reception Scheme for Linux Networking Subsystem
    Salah, K.
    Qahtan, A.
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 213 - 217
  • [46] Development of structure of a subsystem of information security of the automated system
    Bakhracheva, Yulia
    XIII INTERNATIONAL SCIENTIFIC-TECHNICAL CONFERENCE DYNAMIC OF TECHNICAL SYSTEMS (DTS-2017), 2017, 132
  • [47] THE ORGANIZATIONAL SECURITY SUBSYSTEM - SOME POTENTIALLY CATASTROPHIC EVENTS
    GUASTELLO, SJ
    BEHAVIORAL SCIENCE, 1988, 33 (01): : 48 - 58
  • [48] Internet security meets the IP Multimedia Subsystem: an overview
    Berger, Andreas
    Gojmerac, Ivan
    Jung, Oliver
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (2-3) : 185 - 206
  • [49] The design and implementation of router security subsystem based on IPSEC
    Wu, YH
    Wu, JP
    Xu, K
    Xu, MW
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 160 - 165
  • [50] Research on network security subsystem based on digital signal
    Wang, Zhongru
    Ruan, Qiang
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (01) : 97 - 103