Tracing and Detecting Malware using eBPF - Itay Shakury, Aqua Security - Full Lightning
Nullcon Goa 2023 | The Convergence Of EBPF, Buildroot, And QEMU For Automated Linux Malware Analysis
Real-Time Malware Tracing
eBPF - The Future Of Isolated/Malware Analysis
Getting Started with eBPF for Monitoring | Hal Pomeranz & Jon Reeve | 1 Hour
Detecting Cryptocurrency Mining With eBPF
Tracee - system tracing using eBPF
Tracking Files across the operating system using eBPF - Carl El Khoury
Linux eBPF Malware Review in Ghidra
Tracking Kubernetes activity with eBPF and Tracee Policies
Malware Trace Analysis - discussion
eBPF Warfare - Detecting Kernel & eBPF Rootkits with Tracee
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference
Threat ODFIDR : eBPF-Sandboxing - Analyse de Malwares (PDF)
DEF CON 29 - Guillaume Fournier, Sylvain Afchain, Sylvain Baubeau - eBPF, I thought we were friends!
eBPF ELFs JMPing Through the Windows
Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole
DEF CON 30 - Rex Guo, Junyuan Zeng - Trace me if you can: Bypassing Linux Syscall Tracing
Analysis of offensive capabilities of eBPF and implementation of a rootkit-Marcos Bajo Juan Tapiador
Identity Aware Threat Detection & Network Monitoring by using eBPF - Natalia Reka Ivanko, Isovalent