Talk
Intermediate
First Talk

Understanding programmable system call security with secure computing in Linux

Review Pending

In today's computing world, protecting userspace applications is essential to mitigate security threats. The Linux kernel exposes approximately 400 system calls, each creating a potential vulnerability window that attackers could exploit to compromise application stability. 

BPF, Berkeley Packet Filter program can be used to observe events across a system and report information about those events to user space tools. SECure COMPuting-eBPF provides a mechanism to restrict the system calls that an application can make to the kernel. The fundamental concept involves implementing system call filtering based on both system call numbers and their arguments. Through this approach, security policies can precisely define which system calls should be permitted or prohibited, with filters making runtime decisions.

In this session, we will examine the implementation of seccomp-eBPF for improving application security, demonstrating how to create effective filtering rules that protect userspace applications without compromising functionality or performance. We will cover practical demonstrations, common pitfalls to avoid, and techniques for balancing security with application requirements. 

Attendees will gain insights into Linux system security for applications against kernel-level exploits through system call restrictions.



None
FOSS

kiran belle
Senior Software Engineer Red Hat India Private Limited
Speaker Image

0 %
Approvability
0
Approvals
0
Rejections
0
Not Sure
No reviews yet.