Главная
Study mode:
on
1
Intro
2
Why compartmentalize?
3
Transient execution attacks Spectre & friends
4
Memory Protection Keys: PKU/PKS
5
PKS in-depth
6
Challenges
7
PKS eBPF isolation
8
eBPF mitigations
9
ASI: Address Space Isolation
10
Conclusion
Description:
Explore the design and implementation of a new kernel hardening strategy that compartmentalizes the Linux kernel using Intel Protection Keys for Supervisor (PKS) in this 50-minute conference talk. Delve into the importance of kernel compartmentalization in mitigating memory errors and transient execution attacks. Learn how PKS can limit memory access in critical regions, reducing the attack surface and providing robust protection against vulnerabilities. Examine the challenges of implementation, focusing on PKS eBPF isolation and its mitigations. Gain insights into how this approach aligns with ongoing efforts in Address-space Isolation (ASI). Understand the potential impact of this security feature on hindering exploits from eBPF and third-party kernel modules, while maintaining compatibility and lightweight implementation.

MPK/PKS Linux Kernel Compartmentalization

Linux Foundation
Add to list
00:00
-49:41