Preventing Unintended Data Access: Information Flow Control in eBPF
| dc.contributor.author | Dimobi, Chinecherem | en |
| dc.contributor.department | Computer Science | en |
| dc.date.accessioned | 2025-07-25T17:19:29Z | en |
| dc.date.available | 2025-07-25T17:19:29Z | en |
| dc.date.issued | 2025-04-14 | en |
| dc.description.abstract | We: 1) Identify the balance between allowing access to sensitive data and preventing leakages in kernel extensions. 2) Design techniques to assign sensitivity labels and policies to inputs/outputs of kernel extensions, propagating them during execution. 3) Implement a system that distinguishes between safe and malicious kernel extensions that access sensitive data. | en |
| dc.description.sponsorship | College of Engineering | en |
| dc.format.extent | Dimensions: 1920 × 1080 | en |
| dc.format.extent | Duration: 00:04:58 | en |
| dc.format.extent | Size: 71.4 MB | en |
| dc.format.mimetype | video/mp4 | en |
| dc.format.mimetype | text/vtt | en |
| dc.identifier.uri | https://hdl.handle.net/10919/136914 | en |
| dc.language.iso | en | en |
| dc.publisher | Virginia Tech | en |
| dc.relation.ispartofseries | 2025 Paul E. Torgersen Award Winners | en |
| dc.rights | In Copyright | en |
| dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
| dc.subject | Computer Science | en |
| dc.title | Preventing Unintended Data Access: Information Flow Control in eBPF | en |
| dc.type | Video | en |
| dc.type | Presentation | en |
| dc.type.dcmitype | MovingImage | en |