HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64

Peihua Zhang, Chenggang Wu, Xiangyu Meng, Yinqian Zhang, Mingfan Peng, Mengyao Xie, Yuanming Lai, Yan Kang, Zhe Wang

33rd USENIX Security Symposium · Day 1 · USENIX Security '24

The talk "HIVE: A Hardware-assisted Isolated Execution Environment for eBPF on AArch64" presented at USENIX Security '24, introduces a novel approach to enhance the security and capability of **extended Berkeley Packet Filter (eBPF)** programs. eBPF is a powerful in-kernel virtual machine that allows users to extend kernel functionality without modifying kernel source code or loading kernel modules, enabling dynamic and programmable kernel behavior for tasks like networking, tracing, and security. However, its tight integration with the kernel necessitates stringent security measures, primarily enforced by a software-based verifier. This talk, delivered by Peihua Zhang and his team, addresses the inherent limitations of this verification-based security model.

AI review

This isn't just another eBPF talk; it's a fundamental shift. HIVE leverages AArch64 hardware to build a truly isolated execution environment for eBPF, finally addressing the verifier's inherent failures and unlocking the platform's full potential. This is how you build secure in-kernel extensibility, not with more software patches.

Watch on YouTube