USENIX Security '24 - BeeBox: Hardening BPF against Transient Execution Attacks
Автор: USENIX
Загружено: 2024-11-12
Просмотров: 145
Описание:
BeeBox: Hardening BPF against Transient Execution Attacks
Di Jin, Alexander J. Gaidis, and Vasileios P. Kemerlis, Brown University
The Berkeley Packet Filter (BPF) has emerged as the de-facto standard for carrying out safe and performant, user-specified computation(s) in kernel space. However, BPF also increases the attack surface of the OS kernel disproportionately, especially under the presence of transient execution vulnerabilities. In this work, we present BeeBox: a new security architecture that hardens BPF against transient execution attacks, allowing the OS kernel to expose eBPF functionality to unprivileged users and applications. At a high level, BeeBox sandboxes the BPF runtime against speculative code execution in an SFI-like manner. Moreover, by using a combination of static analyses and domain-specific properties, BeeBox selectively elides enforcement checks, improving performance without sacrificing security. We implemented a prototype of BeeBox for the Linux kernel that supports popular features of eBPF (e.g., BPF maps and helper functions), and evaluated it both in terms of effectiveness and performance, demonstrating resilience against prevalent transient execution attacks (i.e., Spectre-PHT and Spectre-STL) with low overhead. On average, BeeBox incurs 20% overhead in the Katran benchmark, while the current mitigations of Linux incur 112% overhead. Lastly, BeeBox exhibits less than 1% throughput degradation in end-to-end, real-world settings that include seccomp-BPF and packet filtering.
View the full USENIX Security '24 program at https://www.usenix.org/conference/use...
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: