Загрузка страницы

Using Seccomp to Limit the Kernel Attack Surface - Michael Kerrisk, man7.org Training and Consulting

Using Seccomp to Limit the Kernel Attack Surface - Michael Kerrisk, man7.org Training and Consulting

The seccomp (secure computing) facility is a means to select exactly which system calls a program is permitted to make and to restrict the arguments that may be passed to those system calls. System call filtering is achieved by writing BPF programs--programs written for a small in-kernel virtual machine that is able to examine system call numbers and arguments. Seccomp applications include sandboxing and failure-mode testing, and seccomp is by now used in a number of web browsers, container systems, and elsewhere. After outlining the basics of the BPF virtual machine, we look at some examples of filtering programs that restrict the set of permitted system calls, consider some productivity aids for seccomp writing filters, and note also some caveats to with respect to the use of seccomp.

About Michael Kerrisk
Michael Kerrisk is the author of the acclaimed book, "The Linux Programming Interface" (http://man7.org/tlpi/), a guide and reference for system programming on Linux and UNIX. He contributes to the Linux kernel primarily via documentation, review, and testing of new kernel-user-space interfaces. He has contributed to the Linux man-pages project (http://www.kernel.org/doc/man-pages/) since 2000, and been the project maintainer since 2004. Michael is a trainer and consultant, living in Munich, Germany.

Видео Using Seccomp to Limit the Kernel Attack Surface - Michael Kerrisk, man7.org Training and Consulting канала The Linux Foundation
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
25 октября 2018 г. 23:39:18
01:28:46
Другие видео канала
Mentorship Session: Video Codecs and the Virtual Stateless Decoder Driver (visl)Mentorship Session: Video Codecs and the Virtual Stateless Decoder Driver (visl)Linux Foundation Announces New Projects To Help Telcos Innovate With Open Source | Arpit JoshipuraLinux Foundation Announces New Projects To Help Telcos Innovate With Open Source | Arpit JoshipuraOpen Source Has Become Increasingly Diversified | Lin SunOpen Source Has Become Increasingly Diversified | Lin SunIOMAP conversion status - Luis ChamberlainIOMAP conversion status - Luis ChamberlainTutorial: Getting Started with eBPF - Liz Rice, IsovalentTutorial: Getting Started with eBPF - Liz Rice, IsovalentRevamping ioctl with io_uring - Kanchan Joshi & Anuj Gupta, Samsung Semiconductor India ResearchRevamping ioctl with io_uring - Kanchan Joshi & Anuj Gupta, Samsung Semiconductor India ResearchGetting to Know the Linux Kernel: A Beginner's Guide - Kelsey Steele & Nischala Yelchuri, MicrosoftGetting to Know the Linux Kernel: A Beginner's Guide - Kelsey Steele & Nischala Yelchuri, MicrosoftLF Live Webinar: Kubernetes Called and it Wants Your IaC BackLF Live Webinar: Kubernetes Called and it Wants Your IaC BackBetter, Faster, Stronger: How the Global Acceleration of OS Development Is ChangingBetter, Faster, Stronger: How the Global Acceleration of OS Development Is ChangingWhat Does a CPU Do Before Going to Work (in an Embedded System)? - Josef Holzmayr, Mender.ioWhat Does a CPU Do Before Going to Work (in an Embedded System)? - Josef Holzmayr, Mender.ioBasics of I2C on Linux - Luca Ceresoli, BootlinBasics of I2C on Linux - Luca Ceresoli, BootlinHow ARM Systems are Booted: An Introduction to the ARM Boot Flow - Rouven CzerwinskiHow ARM Systems are Booted: An Introduction to the ARM Boot Flow - Rouven CzerwinskiTales from the Crypt: Implementing Secure Boot and Disk Encryption on Tegra Platforms - Tim OrlingTales from the Crypt: Implementing Secure Boot and Disk Encryption on Tegra Platforms - Tim OrlingMaking Fuzzing Part of Your Software Development Lifecycle - Jonathan Metzman, GoogleMaking Fuzzing Part of Your Software Development Lifecycle - Jonathan Metzman, GoogleBeing Systematic with systemd - Chris Simmonds, 2net LtdBeing Systematic with systemd - Chris Simmonds, 2net LtdLinux on RISC-V and the New OS-A Platform - Drew Fustini, BayLibreLinux on RISC-V and the New OS-A Platform - Drew Fustini, BayLibreio_uring: So Fast. It's Scary. - Paul Moore, Microsoftio_uring: So Fast. It's Scary. - Paul Moore, MicrosoftBooting Automotive ECUs Really Fast with Modern Security Features - Brendan Le Foll, BMW Car IT GmbHBooting Automotive ECUs Really Fast with Modern Security Features - Brendan Le Foll, BMW Car IT GmbHThe Evolution of Milvus: A Cloud-Native Vector Database - Frank Liu, ZillizThe Evolution of Milvus: A Cloud-Native Vector Database - Frank Liu, ZillizSlirp is Dead, Long Live Slirp! A New Approach to User-mode Networking - Stefano Brivio & Alona PazSlirp is Dead, Long Live Slirp! A New Approach to User-mode Networking - Stefano Brivio & Alona PazDistrobox - Run Any App from Any Distro - Luca Di Maio, ContractorDistrobox - Run Any App from Any Distro - Luca Di Maio, Contractor
Яндекс.Метрика