Dimobi, Chinecherem2025-07-252025-07-252025-04-14https://hdl.handle.net/10919/136914We: 1) Identify the balance between allowing access to sensitive data and preventing leakages in kernel extensions. 2) Design techniques to assign sensitivity labels and policies to inputs/outputs of kernel extensions, propagating them during execution. 3) Implement a system that distinguishes between safe and malicious kernel extensions that access sensitive data.Dimensions: 1920 × 1080Duration: 00:04:58Size: 71.4 MBvideo/mp4text/vttenIn CopyrightComputer SciencePreventing Unintended Data Access: Information Flow Control in eBPFVideo