LSM BPF Change Everything - Leonardo Di Donato, Elastic & KP Singh, Google
eCHO episode 29: BPF LSM with KP Singh
BPF and Security. Friends and Foes - Alexei Starovoitov, Meta
bpfbox: Simple Precise Process Confinement with KRSI and eBPF (William Findlay)
A Moderate Introduction to BPF programming with Rust
FOSDEM 2025: Syd: An Introduction to Secure Application Sandboxing for Linux
Observability and performance analysis with BPF - David Calavera - @calavera
Making Linux Security Modules available to Containers Stacking and Namespacing the LSM
Real Time Security - eBPF for Preventing attacks - Liz Rice, Isovalent
Reusing the BPF CI
io_uring: So Fast. It's Scary. - Paul Moore, Microsoft
The Cross-Platform Future of eBPF- Dave Thaler, Microsoft
Extending systemd Security Features with eBPF - Mauricio Vásquez Bernal, Microsoft
BPF In Practice
🚀 Enhancing Cybersecurity with Sauron eBPF 🚀
Towards truly portable eBPF - Itay Shakury/Rafael David Tinoco
Kernel Recipes 2016 - Landlock LSM: Unprivileged sandboxing - Mickaël Salaün
ELISA Summit (Sep 2022) | Analysis of eBPF for Safety Use Case
Security Auditing and Enforcement using eBPF - KP Singh, Google - Full Keynote
Integrity by Mimi Zohar