Open this publication in new window or tab >>2025 (English)In: ANRW '25: Proceedings of the 2025 Applied Networking Research Workshop, Association for Computing Machinery (ACM), 2025, p. 128-135Conference paper, Published paper (Refereed)
Abstract [en]
eBPF allows for dynamic kernel customization at runtimewith low overhead and fine-grained control over system operations. In recent years, its usage has increased in domainswhere performance is critical, including network management, system observability, and container security. However,the use of eBPF brings new challenges, particularly in development, security, and management, due to its complexity. Toimprove the use of eBPF, we propose a framework that packages signed eBPF bytecode along with a manifest and proofof logging in a transparency log. The manifest defines thepermissions required for the eBPF program, giving a secondverification level. Transparency logs can increase accountability because they show the entire lifecycle of a program,thereby holding administrators or developers accountablefor their actions. We also suggest that every eBPF programmust adhere to a local policy for security and compliance.This framework simplifies the deployment of eBPF whileimproving security, accountability, and compliance, makingeBPF more accessible for widespread use in critical systems.
Place, publisher, year, edition, pages
Association for Computing Machinery (ACM), 2025
Keywords
eBPF, Security, Transparency log, Packaging model, Manifest
National Category
Other Engineering and Technologies
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-106614 (URN)10.1145/3744200.3744781 (DOI)001592913900018 ()2-s2.0-105013047220 (Scopus ID)979-8-4007-2009-3 (ISBN)
Conference
Applied Networking Research Workshop (ANRW 25), Madrid, Spain, July 22, 2025.
2025-08-192025-08-192026-02-12Bibliographically approved