Tracing and Detecting Malware using eBPF - Itay Shakury, Aqua Security - Full Lightning
Real-Time Malware Tracing
Linux eBPF Malware Review in Ghidra
Getting Started with BPF Security Observability - Vandana Salve, Independent Consultant
Return to Sender - Detecting Kernel Exploits with eBPF
Identity Aware Threat Detection & Network Monitoring by using eBPF - Natalia Reka Ivanko, Isovalent
eBPF Warfare - Detecting Kernel & eBPF Rootkits with Tracee
eBPF - The Future Of Isolated/Malware Analysis
35C3 2018 Kernel Tracing With eBPF
How do hackers get caught? - the hunt for the hacker.
Tracking Kubernetes activity with eBPF and Tracee Policies
Boosting Cloud Native Security With eBPF
LinuxDays 2019 - Inspect IoT malware: Intro to Linux tracing and behavioral analysis- Daniel Uhříček
Detecting Cryptocurrency Mining With eBPF
Think eBPF for Kernel Security Monitoring – Eric Sage & Melissa Kilby, Apple
you need this FREE CyberSecurity tool
Analysis of offensive capabilities of eBPF and implementation of a rootkit-Marcos Bajo Juan Tapiador
Tracking Files across the operating system using eBPF - Carl El Khoury
Rust & Tell Berlin September 2021 - Michał Rostecki: Developing and managing eBPF programs with Rust
Data-centric tracing using the BPF Type Format (BTF) – Alan Maguire, Oracle