Change search
Link to record
Permanent link

Direct link
Publications (10 of 52) Show all publications
Gbadamosi, B., Pulls, T. & Høiland-Jørgensen, T. (2025). Secure Deployment of eBPF Programs Made Manifest. In: ANRW '25: Proceedings of the 2025 Applied Networking Research Workshop. Paper presented at Applied Networking Research Workshop (ANRW 25), Madrid, Spain, July 22, 2025. (pp. 128-135). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Secure Deployment of eBPF Programs Made Manifest
2025 (English)In: ANRW '25: Proceedings of the 2025 Applied Networking Research Workshop, Association for Computing Machinery (ACM), 2025, p. 128-135Conference paper, Published paper (Refereed)
Abstract [en]

eBPF allows for dynamic kernel customization at runtimewith low overhead and fine-grained control over system operations. In recent years, its usage has increased in domainswhere performance is critical, including network management, system observability, and container security. However,the use of eBPF brings new challenges, particularly in development, security, and management, due to its complexity. Toimprove the use of eBPF, we propose a framework that packages signed eBPF bytecode along with a manifest and proofof logging in a transparency log. The manifest defines thepermissions required for the eBPF program, giving a secondverification level. Transparency logs can increase accountability because they show the entire lifecycle of a program,thereby holding administrators or developers accountablefor their actions. We also suggest that every eBPF programmust adhere to a local policy for security and compliance.This framework simplifies the deployment of eBPF whileimproving security, accountability, and compliance, makingeBPF more accessible for widespread use in critical systems.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
eBPF, Security, Transparency log, Packaging model, Manifest
National Category
Other Engineering and Technologies
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-106614 (URN)10.1145/3744200.3744781 (DOI)001592913900018 ()2-s2.0-105013047220 (Scopus ID)979-8-4007-2009-3 (ISBN)
Conference
Applied Networking Research Workshop (ANRW 25), Madrid, Spain, July 22, 2025.
Available from: 2025-08-19 Created: 2025-08-19 Last updated: 2026-02-12Bibliographically approved
Iwaya, L. H., Kamm, L., Martucci, L. & Pulls, T. (Eds.). (2025). Secure IT Systems. Paper presented at 29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 .. Springer, 15396 LNCS
Open this publication in new window or tab >>Secure IT Systems
2025 (English)Conference proceedings (editor) (Refereed)
Abstract [en]

This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 6–7, 2024.

The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.

Place, publisher, year, edition, pages
Springer, 2025. p. 502
Series
NordSec: Nordic Conference on Secure IT Systems
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-104041 (URN)10.1007/978-3-031-79007-2 (DOI)2-s2.0-85218681141 (Scopus ID)978-3-031-79006-5 (ISBN)978-3-031-79007-2 (ISBN)
Conference
29th Nordic Conference, NordSec 2024 Karlstad, Sweden, November 6–7, 2024 .
Available from: 2025-04-25 Created: 2025-04-25 Last updated: 2026-02-12Bibliographically approved
Iwaya, L. H., Kamm, L., Martucci, L. & Pulls, T. (Eds.). (2024). Secure IT Systems: Proceedings of the 29th Nordic Conference, NordSec 2024. Paper presented at The 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6–7, 2024.. Springer
Open this publication in new window or tab >>Secure IT Systems: Proceedings of the 29th Nordic Conference, NordSec 2024
2024 (English)Conference proceedings (editor) (Refereed)
Abstract [en]

This book constitutes the refereed proceedings of the 29th International Conference on Secure IT Systems, NordSec 2024, held in Karlstad, Sweden, during November 6–7, 2024.

The 25 full papers presented in this book were carefully reviewed and selected from 59 submissions. They focus on topics such as: Authentication; Cryptography; Cyber-Physical Systems; Cybersecurity and Policy; LLMs for Security; Formal Verification; Mobile and IoT; Network Security; and Privacy.

Place, publisher, year, edition, pages
Springer, 2024. p. 502
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 15396
Keywords
computer crime, computer forensics, computer hardware, computer networks, communication systems, computer science, computer security, computer systems, cryptography, data communication systems, data security, identity management systems, network protocols, network security, privacy, data protection, artificial intelligence, cyber security, machine learning
National Category
Computer Sciences Computer Systems Computer Engineering
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-102875 (URN)10.1007/978-3-031-79007-2 (DOI)978-3-031-79006-5 (ISBN)978-3-031-79007-2 (ISBN)
Conference
The 29th Nordic Conference, NordSec 2024, Karlstad, Sweden, November 6–7, 2024.
Available from: 2025-01-29 Created: 2025-01-29 Last updated: 2026-02-12Bibliographically approved
Gbadamosi, B., Leonardi, L., Pulls, T., Høiland-Jørgensen, T., Ferlin-Reiter, S., Sorce, S. & Brunstrom, A. (2024). The eBPF Runtime in the Linux Kernel. , abs/2410.00026
Open this publication in new window or tab >>The eBPF Runtime in the Linux Kernel
Show others...
2024 (English)Manuscript (preprint) (Other academic)
Abstract [en]

Extended Berkeley Packet Filter (eBPF) is a runtime that enables users to load programs into the operating system (OS) kernel, like Linux or Windows, and execute them safely and efficiently at designated kernel hooks. Each program passes through a verifier that reasons about the safety guarantees for execution. Hosting a safe virtual machine runtime within the kernel makes it dynamically programmable. Unlike the popular approach of bypassing or completely replacing the kernel, eBPF gives users the flexibility to modify the kernel on the fly, rapidly experiment and iterate, and deploy solutions to achieve their workload-specific needs, while working in concert with the kernel.In this paper, we present the first comprehensive description of the design and implementation of the eBPF runtime in the Linux kernel. We argue that eBPF today provides a mature and safe programming environment for the kernel. It has seen wide adoption since its inception and is increasingly being used not just to extend, but program entire components of the kernel, while preserving its runtime integrity. We outline the compelling advantages it offers for real-world production usage, and illustrate current use cases. Finally, we identify its key challenges, and discuss possible future directions.

National Category
Other Engineering and Technologies
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-104201 (URN)10.48550/ARXIV.2410.00026 (DOI)
Available from: 2025-05-06 Created: 2025-05-06 Last updated: 2026-02-12Bibliographically approved
Magnusson, J., Müller, M., Brunstrom, A. & Pulls, T. (2023). A Second Look at DNS QNAME Minimization. In: Anna Brunström; Marcel Flores; Marco Fiore (Ed.), Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings. Paper presented at 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023 (pp. 496-521). Springer
Open this publication in new window or tab >>A Second Look at DNS QNAME Minimization
2023 (English)In: Passive and Active Measurement: 24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023, Proceedings / [ed] Anna Brunström; Marcel Flores; Marco Fiore, Springer, 2023, p. 496-521Conference paper, Published paper (Refereed)
Abstract [en]

The Domain Name System (DNS) is a critical Internet infrastructure that translates human-readable domain names to IP addresses. It was originally designed over 35 years ago and multiple enhancements have since then been made, in particular to make DNS lookups more secure and privacy preserving. Query name minimization (qmin) was initially introduced in 2016 to limit the exposure of queries sent across DNS and thereby enhance privacy. In this paper, we take a look at the adoption of qmin, building upon and extending measurements made by De Vries et al. in 2018. We analyze qmin adoption on the Internet using active measurements both on resolvers used by RIPE Atlas probes and on open resolvers. Aside from adding more vantage points when measuring qmin adoption on open resolvers, we also increase the number of repetitions, which reveals conflicting resolvers – resolvers that support qmin for some queries but not for others. For the passive measurements at root and Top-Level Domain (TLD) name servers, we extend the analysis over a longer period of time, introduce additional sources, and filter out non-valid queries. Furthermore, our controlled experiments measure performance and result quality of newer versions of the qmin -enabled open source resolvers used in the previous study, with the addition of PowerDNS. Our results, using extended methods from previous work, show that the adoption of qmin has significantly increased since 2018. New controlled experiments also show a trend of higher number of packets used by resolvers and lower error rates in the DNS queries. Since qmin is a balance between performance and privacy, we further discuss the depth limit of minimizing labels and propose the use of a public suffix list for setting this limit.

Place, publisher, year, edition, pages
Springer, 2023
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 13882
Keywords
Internet protocols; Privacy-preserving techniques, Controlled experiment; Domain name system; Domain names; Human-readable; Internet infrastructure; Lookups; Minimisation; Performance; Privacy; QNAME minimization, Quality control
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-94279 (URN)10.1007/978-3-031-28486-1_21 (DOI)2-s2.0-85151060508 (Scopus ID)
Conference
24th International Conference, PAM 2023, Virtual Event, March 21–23, 2023
Available from: 2023-04-19 Created: 2023-04-19 Last updated: 2026-02-12Bibliographically approved
Dejaeghere, J., Gbadamosi, B., Pulls, T. & Rochet, F. (2023). Comparing Security in eBPF and WebAssembly. In: : . Paper presented at ACM SIGCOMM 2023 (pp. 35-41). New York, United States: ACM Publications
Open this publication in new window or tab >>Comparing Security in eBPF and WebAssembly
2023 (English)Conference paper, Published paper (Refereed)
Abstract [en]

This paper examines the security of eBPF and WebAssembly (Wasm), two technologies that have gained widespread adoption in recent years, despite being designed for very different use cases and environments. While eBPF is a technology primarily used within operating system kernels such as Linux, Wasm is a binary instruction format designed for a stack-based virtual machine with use cases extending beyond the web. Recognizing the growth and expanding ambitions of eBPF, Wasm may provide instructive insights, given its design around securely executing arbitrary untrusted programs in complex and hostile environments such as web browsers and clouds. We analyze the security goals, community evolution, memory models, and execution models of both technologies, and conduct a comparative security assessment, exploring memory safety, control flow integrity, API access, and side-channels. Our results show that eBPF has a history of focusing on performance first and security second, while Wasm puts more emphasis on security at the cost of some runtime overheads. Considering language-based restrictions for eBPF and a security model for API access are fruitful directions for future work. © 2023 Owner/Author(s).

Place, publisher, year, edition, pages
New York, United States: ACM Publications, 2023
Keywords
Access control; Computer operating systems; API access; Complex environments; Control-flow integrities; EBPF; Memory safety; Operating system kernel; Security comparison; Side-channel; Threat modeling; Webassembly; Web browsers
National Category
Other Engineering and Technologies
Research subject
Computer Science; Computer Science
Identifiers
urn:nbn:se:kau:diva-104200 (URN)10.1145/3609021.3609306 (DOI)001302566100006 ()2-s2.0-85169019212 (Scopus ID)
Conference
ACM SIGCOMM 2023
Available from: 2025-05-06 Created: 2025-05-06 Last updated: 2026-02-12Bibliographically approved
Pulls, T. & Witwer, E. (2023). Maybenot: A Framework for Traffic Analysis Defenses. In: WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society: . Paper presented at 22nd Workshop on Privacy in the Electronic Society, WPES, Copenhagen, Denmark, November 26, 2023. (pp. 75-89). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Maybenot: A Framework for Traffic Analysis Defenses
2023 (English)In: WPES 2023 - Proceedings of the 22nd Workshop on Privacy in the Electronic Society, Association for Computing Machinery (ACM), 2023, p. 75-89Conference paper, Published paper (Refereed)
Abstract [en]

In light of the increasing ubiquity of end-to-end encryption and the use of technologies such as Tor and VPNs, analyzing communications metadata - -traffic analysis - -is a last resort for network adversaries. Traffic analysis attacks are more effective thanks to improvements in deep learning, raising the importance of deploying defenses. This paper introduces Maybenot, a framework for traffic analysis defenses. Maybenot is an evolution and generalization of the Tor Circuit Padding Framework by Perry and Kadianakis, designed to support a wide range of protocols and use cases. Defenses are probabilistic state machines that trigger padding and blocking actions based on events. A lightweight simulator enables rapid development and testing of defenses. In addition to describing the Maybenot framework, machines, and simulator, we implement and thoroughly evaluate the state-of-the-art website fingerprinting defenses FRONT and RegulaTor as Maybenot machines. Our evaluation identifies challenges associated with state machine-based frameworks as well as possible enhancements that will further improve Maybenot’s support for effective defenses moving forward.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2023
Keywords
Cryptography, Deep learning, Petroleum reservoir evaluation, Blockings, Development and testing, End-to-end encryption, Framework, Generalisation, Probabilistics, State-machine, Traffic analysis, Traffic analysis attacks, Website fingerprinting defense, Websites
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-97921 (URN)10.1145/3603216.3624953 (DOI)2-s2.0-85180006594 (Scopus ID)9798400702358 (ISBN)
Conference
22nd Workshop on Privacy in the Electronic Society, WPES, Copenhagen, Denmark, November 26, 2023.
Available from: 2024-01-04 Created: 2024-01-04 Last updated: 2026-02-12Bibliographically approved
Dahlberg, R. & Pulls, T. (2023). Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache. In: Proceedings of the 32nd USENIX Security Symposium: . Paper presented at 32nd USENIX Security Symposium, Anaheim, USA, August 9-11, 2023. (pp. 2635-2652). USENIX - The Advanced Computing Systems Association, 4
Open this publication in new window or tab >>Timeless Timing Attacks and Preload Defenses in Tor's DNS Cache
2023 (English)In: Proceedings of the 32nd USENIX Security Symposium, USENIX - The Advanced Computing Systems Association, 2023, Vol. 4, p. 2635-2652Conference paper, Published paper (Refereed)
Abstract [en]

We show that Tor's DNS cache is vulnerable to a timeless timing attack, allowing anyone to determine if a domain is cached or not  without any false positives.  The attack requires sending a single TLS record. It can be repeated to determine when a domain is no longer cached to leak the insertion time.  Our evaluation in the Tor network shows no instances of cached domains being reported as uncached and vice versa after 12M repetitions while only targeting our own domains. This shifts DNS in Tor from an unreliable side-channel---using traditional timing attacks with network jitter---to being perfectly reliable.  We responsibly disclosed the attack and suggested two short-term mitigations.

As a long-term defense for the DNS cache in Tor against all types of (timeless) timing attacks, we propose a redesign where only an allowlist of domains is preloaded to always be cached across circuits.  We compare the performance of a preloaded DNS cache to Tor's current solution towards DNS by measuring aggregated statistics for four months from two exits (after engaging with the Tor Research Safety Board and our university ethical review process). The evaluated preload lists are variants of the following top-lists: Alexa, Cisco Umbrella, and Tranco. Our results show that four-months-old preload lists can be tuned to offer comparable performance under similar resource usage or to significantly improve shared cache-hit ratios (2--3x) with a modest increase in memory usage and resolver load compared to a 100 Mbit/s exit.  We conclude that Tor's current DNS cache is mostly a privacy harm because the majority of cached domains are unlikely to lead to cache hits but remain there to be probed by attackers.

Place, publisher, year, edition, pages
USENIX - The Advanced Computing Systems Association, 2023
Keywords
Tor, DNS, Side-channels, Timing attack, Timeless timing attack, Traffic Analysis, Website Fingerprinting, Website Oracle
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-94325 (URN)2-s2.0-85176112393 (Scopus ID)978-1-939133-37-3 (ISBN)
Conference
32nd USENIX Security Symposium, Anaheim, USA, August 9-11, 2023.
Projects
SURPRISE (SSF, RIT17-0005)
Funder
Swedish Foundation for Strategic ResearchSwedish Foundation for Strategic Research
Available from: 2023-04-18 Created: 2023-04-18 Last updated: 2026-02-12Bibliographically approved
Beckerle, M., Magnusson, J. & Pulls, T. (2022). Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense. In: Yuan Hong; Lingyu Wang (Ed.), WPES 2022: Proceedings of the 21st Workshop on Privacy in the Electronic Society. Paper presented at WPES'22 @ CCS'22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, USA, 7 November 2022 (pp. 15-27). Association for Computing Machinery (ACM)
Open this publication in new window or tab >>Splitting Hairs and Network Traces: Improved Attacks Against Traffic Splitting as a Website Fingerprinting Defense
2022 (English)In: WPES 2022: Proceedings of the 21st Workshop on Privacy in the Electronic Society / [ed] Yuan Hong; Lingyu Wang, Association for Computing Machinery (ACM), 2022, p. 15-27Conference paper, Published paper (Refereed)
Abstract [en]

The widespread use of encryption and anonymization technologies - -e.g., HTTPS, VPNs, Tor, and iCloud Private Relay - -makes network attackers likely to resort to traffic analysis to learn of client activity. For web traffic, such analysis of encrypted traffic is referred to as Website Fingerprinting (WF). WF attacks have improved greatly in large parts thanks to advancements in Deep Learning (DL). In 2019, a new category of defenses was proposed: traffic splitting, where traffic from the client is split over two or more network paths with the assumption that some paths are unobservable by the attacker. In this paper, we take a look at three recently proposed defenses based on traffic splitting: HyWF, CoMPS, and TrafficSliver BWR5. We analyze real-world and simulated datasets for all three defenses to better understand their splitting strategies and effectiveness as defenses. Using our improved DL attack Maturesc on real-world datasets, we improve the classification accuracy wrt. state-of-the-art from 49.2% to 66.7% for HyWF, the F1 score from 32.9% to 72.4% for CoMPS, and the accuracy from 8.07% to 53.8% for TrafficSliver BWR5. We find that a majority of wrongly classified traces contain less than a couple hundred of packets/cells: e.g., in every dataset 25% of traces contain less than 155 packets. What cannot be observed cannot be classified. Our results show that the proposed traffic splitting defenses on average provide less protection against WF attacks than simply randomly selecting one path and sending all traffic over that path.

Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2022
Keywords
deep learning, network splitting, website fingerprinting, Classification (of information), Cryptography, HTTP, Network security, Anonymization, Classifieds, Learn+, Network attackers, Real-world datasets, Traffic analysis, Traffic splitting, Websites
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-92774 (URN)10.1145/3559613.3563199 (DOI)2-s2.0-85143255443 (Scopus ID)978-1-4503-9873-2 (ISBN)
Conference
WPES'22 @ CCS'22: 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, USA, 7 November 2022
Funder
.SE (The Internet Infrastructure Foundation)
Available from: 2022-12-27 Created: 2022-12-27 Last updated: 2026-02-12Bibliographically approved
Dahlberg, R., Pulls, T., Ritter, T. & Syverson, P. (2021). Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor. In: Aaron Johnson and Florian Kerschbaum (Ed.), Proceedings on Privacy Enhancing Technologies Symposium: . Paper presented at The 21st Privacy Enhancing Technologies Symposium, [Digital], July 12-16, 2021. (pp. 194-213). Sciendo, 2021(2)
Open this publication in new window or tab >>Privacy-Preserving & Incrementally-Deployable Support for Certificate Transparency in Tor
2021 (English)In: Proceedings on Privacy Enhancing Technologies Symposium / [ed] Aaron Johnson and Florian Kerschbaum, Sciendo , 2021, Vol. 2021, no 2, p. 194-213Conference paper, Published paper (Refereed)
Abstract [en]

The security of the web improved greatly throughout the last couple of years.  A large majority of the web is now served encrypted as part of HTTPS, and web browsers accordingly moved from positive to negative security indicators that warn the user if a connection is insecure.  A secure connection requires that the server presents a valid certificate that binds the domain name in question to a public key.  A certificate used to be valid if signed by a trusted Certificate Authority (CA), but web browsers like Google Chrome and Apple's Safari have additionally started to mandate Certificate Transparency (CT) logging to overcome the weakest-link security of the CA ecosystem.  Tor and the Firefox-based Tor Browser have yet to enforce CT.

In this paper, we present privacy-preserving and incrementally-deployable designs that add support for CT in Tor. Our designs go beyond the currently deployed CT enforcements that are based on blind trust: if a user that uses Tor Browser is man-in-the-middled over HTTPS, we probabilistically detect and disclose cryptographic evidence of CA and/or CT log misbehavior.  The first design increment allows Tor to play a vital role in the overall goal of CT: detect mis-issued certificates and hold CAs accountable.  We achieve this by randomly cross-logging a subset of certificates into other CT logs.  The final increments hold misbehaving CT logs accountable, initially assuming that some logs are benign and then without any such assumption.  Given that the current CT deployment lacks strong mechanisms to verify if log operators play by the rules, exposing misbehavior is important for the web in general and not just Tor.  The full design turns Tor into a system for maintaining a probabilistically-verified view of the CT log ecosystem available from Tor's consensus.  Each increment leading up to it preserves privacy due to and how we use Tor.

Place, publisher, year, edition, pages
Sciendo, 2021
Keywords
Certificate Transparency, Tor
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-94320 (URN)10.2478/popets-2021-0024 (DOI)
Conference
The 21st Privacy Enhancing Technologies Symposium, [Digital], July 12-16, 2021.
Projects
HITS (4707), SURPRISE (SSF, RIT17-0005)
Funder
Swedish Foundation for Strategic Research
Available from: 2023-04-18 Created: 2023-04-18 Last updated: 2026-02-12Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6459-8409

Search in DiVA

Show all publications