January 12, 2020

216 words 2 mins read

Combining WrapFS and eBPF to Provide a Lightweight File System Sandboxing Framework

Combining WrapFS and eBPF to Provide a Lightweight File System Sandboxing Framework

Filesystem (FS) sandboxing is a useful technique to protect sensitive data from untrusted binaries. However, existing approaches do not allow fine-grained control over policy enforcement (e.g., seccom …

Talk Title Combining WrapFS and eBPF to Provide a Lightweight File System Sandboxing Framework
Speakers Ashish Bijlani (PhD Student, Georgia Tech)
Conference Open Source Summit + ELC Europe
Conf Tag
Location Lyon, France
Date Oct 27-Nov 1, 2019
URL Talk Page
Slides Talk Slides
Video

Filesystem (FS) sandboxing is a useful technique to protect sensitive data from untrusted binaries. However, existing approaches do not allow fine-grained control over policy enforcement (e.g., seccomp), require sudo privileges (e.g., SELinux), incur high performance overhead (e.g., ptrace, FUSE), or are prone to TOCTTOU bugs (e.g., syscall interposition).We combine eBPF with WrapFS to provide a lightweight, fine-grained FS sandboxing framework called SandFS for unprivileged users and containers. It is a stackable kernel FS that can safely be extended at runtime from user space using eBPF framework to enforce custom security policies in the kernel and offer native performance.Unprivileged users can use SandFS for protecting private files (e.g., ssh keys) while executing untrusted binaries (e.g., ML models). Web browsers can enforce custom access checks to protect private data from extensions. Containers can be hardened by mounting a separate sandboxing FS layer for each service.

comments powered by Disqus