
Systesign
February 19, 2025 at 03:00 AM
https://www.usenix.org/system/files/usenixsecurity23-he.pdf
eBPF is such an amazing technology with vasts applications within networking, security, tracing, e.t.c. This 2 year old paper on cross container attacks in the cloud using eBPF broaches the seldom explored aspect of eBPF itself posing huge security risks despite its verifier .... with practical exploits at the time such as executing ssh in Google Collab (despite the block) and compromising the entire Alibaba cluster ... while proposing a new eBPF permission model to mitigate against its offensive functions
👍
🖥️
😮
4