BPF for security domain - KP
eCHO episode 29: BPF LSM with KP Singh
Securing CI/CD Systems Through eBPF - Alex Ilgayev, Cycode
Hijacking DNS Port 53 with eBPF & XDP for Remote K8s Access
11-2 Protocols IPv4 Intro, Structure, Length
3-3 Network Taps and Hubbing Out
HEXAeBPF: eBPF Based 5G Core Solution
Performance Insights Into eBPF, Step by Step
BPF as a revolutionary technology for the container landscape
Think eBPF for Kernel Security Monitoring- Falco at Apple- Eric Sage & Melissa Kilby, Apple
15-6 Creating a Network Baseline
USENIX Security '24 - BeeBox: Hardening BPF against Transient Execution Attacks
13-8 Protocols DNS Abnormal S&R
13-7 Protocols DNS Reverse Looksup, Large Response, and Zone Transfers
With Friends Like eBPF, Who Needs Enemies?
Linux eBPF Local User Privilege Escalation
Can We Really Parse DNS in eBPF? Improving Cilium ToFQDN With In-kernel Policy Upda... Hemanth Malla
Applicability of BPF in a Confidential Computing context - Dave Thaler
Lightning Talk: Armoring Cloud Native Workloads with BPF LSM - Barun Acharya, Accuknox
Enabling Hardware-Assisted Shields for Linux Security Subsystems - Zahra Tarkhani, Microsoft