Preventing Unintended Data Access: Information Flow Control in eBPF

dc.contributor.authorDimobi, Chinecherem Stephanieen
dc.contributor.committeechairWilliams, Daniel Johnen
dc.contributor.committeememberYao, Danfengen
dc.contributor.committeememberHicks, Matthewen
dc.contributor.departmentComputer Science and#38; Applicationsen
dc.date.accessioned2025-05-31T08:03:42Zen
dc.date.available2025-05-31T08:03:42Zen
dc.date.issued2025-05-30en
dc.description.abstractThe extended Berkeley Packet Filter (eBPF) technology has become widely adopted by enterprises due to its flexibility and ability to enhance tracing, observability, monitoring, and security within the kernel. However, since the kernel is a critical resource containing sensitive information, eBPF also presents a significant attack surface for malicious actors. One of the challenging-to-detect yet easiest-to-execute attacks is sensitive information leakage, as it does not require additional privileges beyond standard eBPF functionality. Attackers can exfiltrate sensitive data using built-in eBPF mechanisms, such as saving information to a shared data store. Although the eBPF subsystem provides safety guarantees through its verifier, it does not track or restrict access to sensitive data that an eBPF program is not explicitly intended to access. In this research, we propose an information flow control (IFC) system that leverages labels and policies to track and prevent unauthorized access and leakages to sensitive information by third-party eBPF programs. We define sensitive information as any data that a given eBPF program is not explicitly authorized to access. Our approach defines a label-based policy specification that includes an "allow list", IFC-based static analysis to analyze eBPF bytecode, and policy enforcement to prevent malicious programs from loading and attaching into the kernel if they violate predefined security constraints. Results from our implementation show that our framework catches previously undetectable leakage patterns. This work addresses a critical gap in eBPF security by providing a structured mechanism to prevent unintended data access and leakages while maintaining the legitimate use cases of eBPF.en
dc.description.abstractgeneralComputer systems run the world and are critical for almost everything technology. Operators have to constantly monitor the most critical parts of a system, specifically the operating system (OS) for security and reliability. The OS kernel is the piece of software on every computer system that allows applications and services to safely and efficiently utilize computer hardware. In recent years, operators have turned to running small programs within the OS kernel for monitoring purposes. These programs, called "eBPF" programs, have access to sensitive information of applications from the OS kernel and are trusted not to abuse this information. Recent events have shown that eBPF programs can be used maliciously. Operators can be tricked into running malicious eBPF programs that extract unauthorized sensitive information from the kernel. eBPF programs utilize a special verification process to ensure that they are safe and do not cause systems to crash. Unfortunately, the verification process does not prevent eBPF programs from reading unauthorized data and in turn leaking sensitive information. Our work enhances existing verification to eBPF programs by applying a technique of Information Flow Control (IFC) tailored for eBPF. The system statically analyzes the program and ensures sensitive data is not leaked according to a label-based policy specification we define. Our methodology offers a lightweight, pre-verification step that complements existing kernel protections. Results from our implementation show that our framework catches previously undetectable leakage patterns, providing both security and peace of mind for system operators.en
dc.description.degreeMaster of Scienceen
dc.format.mediumETDen
dc.identifier.othervt_gsexam:44029en
dc.identifier.urihttps://hdl.handle.net/10919/134956en
dc.language.isoenen
dc.publisherVirginia Techen
dc.rightsIn Copyrighten
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/en
dc.subjecteBPFen
dc.subjectSecurityen
dc.subjectInformation Flow Controlen
dc.subjectStatic Analysisen
dc.titlePreventing Unintended Data Access: Information Flow Control in eBPFen
dc.typeThesisen
thesis.degree.disciplineComputer Science & Applicationsen
thesis.degree.grantorVirginia Polytechnic Institute and State Universityen
thesis.degree.levelmastersen
thesis.degree.nameMaster of Scienceen

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Dimobi_CS_T_2025.pdf
Size:
2.25 MB
Format:
Adobe Portable Document Format

Collections