YoVDO

Detecting Kernel Exploits with eBPF

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Control-Flow Integrity Courses eBPF Courses

Course Description

Overview

Explore the potential of eBPF (extended Berkeley Packet Filter) for detecting kernel exploits in this 24-minute Black Hat conference talk. Delve into the rapid growth of eBPF within the Linux Kernel, its evolution from network monitoring to broader capabilities, and its approach to system safety and stability. Learn about eBPF probes, challenges, disabling methods, kpreps, kpro, Control Flow Integrity, enforcements, and performance considerations. Gain insights from presenter Guillaume Fournier on leveraging eBPF's expanding functionalities to enhance kernel security.

Syllabus

Introduction
Overview
Why eBPF
eBPF Probes
Problems with eBPF
How to disable eBPF
kpreps
kpro
Control Flow Integrity
Enforcements
Performance
Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube