Reducing the attack surface of the OS kernel is an effective technique to enhance the security of application workloads. In Linux systems, developers can restrict the set of available system calls by using seccomp. Although being widely adopted in browsers, container runtimes, and sandboxing tools, this approach presents some challenges: (i)applying precise filters often requires significant application modifications, which can impede developer productivity, and(ii)the transparent enforcement of filters is bound to use a single, static list with every syscall the application might ever need, resulting in overly permissive and less effective security boundaries. In this paper, we propose an automated method to generate temporally-specialized seccomp filters tailored to the current application state. This significantly enhances the effectiveness of filters, and overcomes the major limitations associated with a single, static filter. We implement our solution by leveraging the eBPF subsystem in the Linux kernel. Specifically, we use in-kernel eBPF programs to monitor the application state and dynamically enable or disable specialized seccomp filters in response to state transitions. We discuss how this approach addresses the limitations of state-of-the-art solutions. Finally, we validate the feasibility of our proposal and show that it introduces a limited overhead.

(2025). POSTER: Transparent Temporally-Specialized System Call Filters . Retrieved from https://hdl.handle.net/10446/317165

POSTER: Transparent Temporally-Specialized System Call Filters

Rossi, Matthew;Beretta, Michele;Facchinetti, Dario;Paraboschi, Stefano
2025-01-01

Abstract

Reducing the attack surface of the OS kernel is an effective technique to enhance the security of application workloads. In Linux systems, developers can restrict the set of available system calls by using seccomp. Although being widely adopted in browsers, container runtimes, and sandboxing tools, this approach presents some challenges: (i)applying precise filters often requires significant application modifications, which can impede developer productivity, and(ii)the transparent enforcement of filters is bound to use a single, static list with every syscall the application might ever need, resulting in overly permissive and less effective security boundaries. In this paper, we propose an automated method to generate temporally-specialized seccomp filters tailored to the current application state. This significantly enhances the effectiveness of filters, and overcomes the major limitations associated with a single, static filter. We implement our solution by leveraging the eBPF subsystem in the Linux kernel. Specifically, we use in-kernel eBPF programs to monitor the application state and dynamically enable or disable specialized seccomp filters in response to state transitions. We discuss how this approach addresses the limitations of state-of-the-art solutions. Finally, we validate the feasibility of our proposal and show that it introduces a limited overhead.
2025
Rossi, Matthew; Beretta, Michele; Facchinetti, Dario; Paraboschi, Stefano Giulio
File allegato/i alla scheda:
File Dimensione del file Formato  
poster-syscalls.pdf

accesso aperto

Versione: publisher's version - versione editoriale
Licenza: Licenza Free to read
Dimensione del file 1.75 MB
Formato Adobe PDF
1.75 MB Adobe PDF Visualizza/Apri
Pubblicazioni consigliate

Aisberg ©2008 Servizi bibliotecari, Università degli studi di Bergamo | Terms of use/Condizioni di utilizzo

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/10446/317165
Citazioni
  • Scopus 2
  • ???jsp.display-item.citation.isi??? 0
social impact