Linux Kernel Journey
Linux Kernel Journey
Nov 7, 2024 · Information Security

Using eBPF to Protect, Detect, and Audit Malicious eBPF Programs

The article analyzes how attackers can abuse eBPF to steal data, elevate privileges, execute commands, and hide processes, then presents concrete eBPF code for such attacks and outlines practical protection, detection, and auditing techniques—including file analysis, bpftool usage, and kernel tracing—to mitigate these threats.

bpftooleBPFkernel security
0 likes · 27 min read
Using eBPF to Protect, Detect, and Audit Malicious eBPF Programs