Since eBPF was introduced into linux kernel, the eBPF verifier keeps the eBPF programs from any wrong-doing. I would like to look into the verifier and see if it's possible to extend the check to avoid reading any sensitive data in the memory.

Looking for hackers with the skills:

Nothing? Add some keywords!

This project is part of:

Hack Week 15

Activity

  • about 4 years ago: acho joined this project.
  • about 4 years ago: acho liked this project.
  • about 4 years ago: bchou liked this project.
  • about 4 years ago: gary_lin started this project.
  • about 4 years ago: gary_lin originated this project.

  • Comments

    Be the first to comment!

    Similar Projects

    This project is one of its kind!