mirror of
https://github.com/h3xduck/TripleCross.git
synced 2025-12-24 18:33:08 +08:00
Revision of complete document + Abstract
This commit is contained in:
@@ -7,7 +7,7 @@ At the beginning of this project, we proposed to study the offensive
|
||||
capabilities of eBPF at the network level and both user- and kernel-space.
|
||||
Our research shows that a malicious eBPF program can drop any network
|
||||
packet and have read and write access over both incoming and outgoing
|
||||
network traffic using XDP and TC programs. We also discusses how it can
|
||||
network traffic using XDP and TC programs. We also discuss how it can
|
||||
read and write any memory at the user-space using kprobes and tracepoints,
|
||||
and that it can tamper with user data passed to the kernel at system calls,
|
||||
although kernel memory cannot be written. In the end, these capabilities
|
||||
|
||||
Reference in New Issue
Block a user