{BeeBox}: Hardening {BPF} against Transient Execution Attacks

D Jin, AJ Gaidis, VP Kemerlis - 33rd USENIX Security Symposium …, 2024 - usenix.org
33rd USENIX Security Symposium (USENIX Security 24), 2024usenix.org
The Berkeley Packet Filter (BPF) has emerged as the de-facto standard for carrying out safe
and performant, user-specified computation (s) in kernel space. However, BPF also
increases the attack surface of the OS kernel disproportionately, especially under the
presence of transient execution vulnerabilities. In this work, we present BeeBox: a new
security architecture that hardens BPF against transient execution attacks, allowing the OS
kernel to expose eBPF functionality to unprivileged users and applications. At a high level …
Abstract
The Berkeley Packet Filter (BPF) has emerged as the de-facto standard for carrying out safe and performant, user-specified computation (s) in kernel space. However, BPF also increases the attack surface of the OS kernel disproportionately, especially under the presence of transient execution vulnerabilities. In this work, we present BeeBox: a new security architecture that hardens BPF against transient execution attacks, allowing the OS kernel to expose eBPF functionality to unprivileged users and applications. At a high level, BeeBox sandboxes the BPF runtime against speculative code execution in an SFI-like manner. Moreover, by using a combination of static analyses and domain-specific properties, BeeBox selectively elides enforcement checks, improving performance without sacrificing security. We implemented a prototype of BeeBox for the Linux kernel that supports popular features of eBPF (eg, BPF maps and helper functions), and evaluated it both in terms of effectiveness and performance, demonstrating resilience against prevalent transient execution attacks (ie, Spectre-PHT and Spectre-STL) with low overhead. On average, BeeBox incurs 20% overhead in the Katran benchmark, while the current mitigations of Linux incur 112% overhead. Lastly, BeeBox exhibits less than 1% throughput degradation in end-to-end, real-world settings that include seccomp-BPF and packet filtering.
usenix.org
以上显示的是最相近的搜索结果。 查看全部搜索结果