Главная
Study mode:
on
1
Introduction
2
Overview
3
Types of activity
4
LD Preload
5
K Probe
6
Linux Security Modules
7
eBPF Program
8
Tetragon
9
Tetragoniska
10
Context
11
Prevention
12
Demo
13
On the stand
14
Security observability
15
Questions
Description:
Explore how eBPF can be leveraged for next-generation security enforcement tooling in this 32-minute conference talk by Liz Rice from Isovalent. Dive into demos and code to understand why NetworkPolicy enforcement with eBPF has been established for years, while preventative security for applications has taken longer to develop. Learn about Phantom attacks and their potential to compromise basic system call hooks. Discover how other eBPF attachment points, such as BPF LSM, can be utilized for preventative security. Gain insights into Tetragon and its role in security observability. While prior knowledge of eBPF is not required, a basic understanding of kernel and user space concepts will be beneficial. Be prepared to examine some C code examples throughout the presentation.

Real-Time Security: Using eBPF for Preventing Attacks

CNCF [Cloud Native Computing Foundation]
Add to list
0:00 / 0:00