Security Auditing and Enforcement using eBPF - KP Singh, Google - Full Keynote
Using eBPF in system security - Li Qiang & Xufeng Zhang
BPF security auditing at Google - Brendan Jackman/KP Singh
bpfbox: Simple Precise Process Confinement with KRSI and eBPF (William Findlay)
lockc - container security with eBPF LSM
Real Time Security - eBPF for Preventing attacks - Liz Rice, Isovalent
Liz Rice – eBPF for Security
eBPF Summit 2020, Day 1
Think eBPF for Kernel Security Monitoring – Eric Sage & Melissa Kilby, Apple
LSM BPF Change Everything - Leonardo Di Donato, Elastic & KP Singh, Google
bpfbox: Simple Precise Process Confinement with KRSI and eBPF - William Findlay, Carleton University
Identity Aware Threat Detection and Network Monitoring by using eBPF (Natalia Reka Ivanko)
High-performance Linux monitoring with eBPF
Tracing and Detecting Malware using eBPF - Itay Shakury, Aqua Security - Full Lightning
Kernel Runtime Security Instrumentation LSM+BPF=KRSI
Strengthen Security with an eBPF-based Kubernetes CNI - Shruti Chaturvedi, MeetKlara
Tracee : converting our eBPF tracer to Go
eCHO episode 29: BPF LSM with KP Singh
Codeless Kubernetes Observability with eBPF
Opening the Black Box: Understanding and Troubleshooting Calico’s eBPF Data Plane - Tomas Hruby
Using eBPF to Measure the k8s Cluster Health
Realtime Bitcoin Core P2P monitoring with User-Space, Statically Defined Tracing (USDT) and eBPF
Can eBPF save us from the data deluge? A case for file filtering in eBPF (Giulia Frascaria)
BSides Leeds 2019: Ee By Packet Filter! (eBPF For Security Monitoring) - James Ogden
eBPF 2022 Summit - Day 2