Главная
Study mode:
on
1
Introduction
2
History of Seccomp
3
Seccomp Filtering
4
Seccomp Filtering History
5
How Seccomp Works
6
Berkeley Packet Filter
7
BPF Virtual Machine
8
Conditional Jump Instructions
9
Relative Offsets
10
The Kernel
11
System Call Data
12
Example Load Instruction
13
Example Conditional Jump
14
Example Return Statement
15
Architecture Field
16
Answer the Filter
17
Kill the Process
18
Attacker
19
Unprivileged User
20
Example Program
21
Filter Program Structure
22
Running the Program
23
BPA Filter Example
24
A Word of Warning
25
LibSetComp
26
Multiple filters
27
Two microphones
28
Contacts
29
SOC Camera
30
SOC Glossary
31
Seccomp Camera
Description:
Explore the seccomp (secure computing) facility for limiting the kernel attack surface in this comprehensive conference talk. Learn how to select permitted system calls and restrict their arguments using BPF programs. Discover applications of seccomp in sandboxing, failure-mode testing, web browsers, and container systems. Delve into the basics of the BPF virtual machine, examine filtering program examples, and explore productivity aids for writing seccomp filters. Gain insights into the history, functionality, and implementation of seccomp, including BPF instructions, system call data handling, and filter program structures. Consider important caveats and limitations when using seccomp for system call filtering. Presented by Michael Kerrisk, renowned author of "The Linux Programming Interface" and maintainer of the Linux man-pages project, this talk provides valuable knowledge for developers and system administrators working with Linux and UNIX systems.

Using Seccomp to Limit the Kernel Attack Surface

Linux Foundation
Add to list