Alessia Messina
Analysis and Testing of eBPF Attack Surfaces.
Rel. Riccardo Sisto. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2024
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (10MB) | Preview |
Abstract
eBPF (Extended Berkeley Packet Filter) is a powerful technology that allows pro- grams to be executed directly in the Linux kernel within a sandbox, in a safe and isolated environment. This capability is crucial because it allows developers to extend kernel functionalities by dynamically inserting custom code, avoiding the lengthy pro- cess required to modify the kernel source code or to add new modules to it and then recompile. Unlike its predecessor BPF, eBPF programs offer great flexibility as they can be attached at many different points in the kernel, called hook points. This al- lows new high-performance networking, observability and security tools to be created.
However, the broad and promising potential of this fast-growing technology makes it imperative to properly and thoroughly investigate its security
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
