Alessio Vantaggi
Study and detection of Spectre vulnerabilities in eBPF C code.
Rel. Riccardo Sisto, Rosario Rizza. Politecnico di Torino, Corso di laurea magistrale in Ingegneria Informatica (Computer Engineering), 2026
|
Preview |
PDF (Tesi_di_laurea)
- Tesi
Licenza: Creative Commons Attribution Non-commercial No Derivatives. Download (3MB) | Preview |
Abstract
The Extended Berkeley Packet Filter (eBPF) is a revolutionary technology introduced in the Linux kernel that enables the execution of sandbox programs in a privileged context, allowing the operating system to be dynamically extended without modifying its source code. Due to its efficiency and flexibility, eBPF is widely adopted for high-performance networking, deep system observability, and real-time security enforcement with minimal overhead. However, executing user-defined code in kernel space introduces significant security issues, including the risk of memory corruption, sensitive data loss, and potential system instability. In particular, eBPF programs are subject to Spectre, a class of speculative execution hardware vulnerabilities that exploit the microarchitectural side channels of modern CPUs to leak sensitive information.
The aim of the thesis is to analyze the security status of eBPF with respect to Spectre attacks by developing proof-of-concept exploits in C that demonstrate feasible attack scenarios
Relatori
Anno Accademico
Tipo di pubblicazione
Numero di pagine
Corso di laurea
Classe di laurea
Aziende collaboratrici
URI
![]() |
Modifica (riservato agli operatori) |
