Container Security Fundamentals - Seccomp
Designing to the Worst Case Scenario - Practical System Call Filtering with Seccomp - Simon Goda
Seccomp: What Can It Do For You? - Justin Cormack, Docker
Seccomp Security Profiles and You: A Practical Guide - Duffie Cooley, VMware
Seccomp and eBPF; What’s the Difference? Why Do I Need to Know? - Natalia Reka Ivanko, Duffie Cooley
Securing Kubernetes Applications by Crafting Custom Seccomp Profiles - Sascha Grunert, Red Hat
Miroslav Franc: Linux's SECCOMP, its usecases and problems
Forwarding system calls to userspace Using Seccomp to intercept system calls and forwarding them to…
pwn.college - Sandboxing - seccomp
Overview and Recent Developments: seccomp and Small Linux Security Modules - Kees Cook, Google
Kubernetes Security - Seccomp | How to use it to restrict Kernel calls in your Pods
Security Topics #1: SECCOMP
Hardening Containers with Seccomp: Hands-On Profiles, Pitfalls, and Real Exploits
seccomp — Your Next Layer of Defense
seccomp listeners for nested containers - Aleksandr Mikhalitsyn (Canonical)
pwn.college - Kernel Security - Escaping Seccomp (for real!)
DeviceDojo Episode 5 - seccomp-bpf
6. Безопасность хоста Docker: 2 Профили Apparmor и Seccomp
Reinventing Seccomp for Fun and Profiles - Ben Hirschberg, ARMO & Dor Serero, Microsoft
pwn.college - Sandboxing - Escaping seccomp
Seccomp, a proposed new security feature in Docker
Generating seccomp profiles for containers using podman and eBPF
Using seccomp to limit the Linux kernel attack service - Michael Kerrisk - NDC Security 2023
Generate seccomp profiles for containers using bpf - DevConf.CZ 2020
Generating seccomp policies with eBPF - Marga Manterola, Microsoft