eBPF Programing Part 2 Malware Detection Using eBPF and LSM
🚀 Enhancing Cybersecurity with Sauron eBPF 🚀
Checking your cryptography usage with eBPF - DevConf.CZ 2020
Building a Behavioral Knowledge Graph using eBPF - Dinesh Venkatesan, Microsoft - Full Lightning
DEF CON 30 - Rex Guo, Junyuan Zeng - Trace me if you can: Bypassing Linux Syscall Tracing
DEF CON 29 - PatH - Warping Reality: Creating and Countering the Next Generation of Linux Rootkits
Infrastructure 2017 - Alfonso Acosta - High-performance Linux monitoring with eBPF
Inside Look @ eBPF for Windows
Identity Aware Threat Detection & Network Monitoring by using eBPF - Natalia Reka Ivanko, Isovalent
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference
DEF CON 29 - Jeff Dileo - Instrument and Find Out: Parasitic Tracers for High Level Languages