This program is tentative and subject to change.
The eBPF technology is widely used for many applications including tracing, packet filtering, network usage monitoring, and so on. The versatility of eBPF allows the kernel’s capabilities to be extended without needing to modify source code or load kernel modules. However, the eBPF subsystem may introduce new bugs that could lead to crashes, data loss, and other issues that can negatively impact system stability, reliability, availability, security, and overall performance. Specifically, locking violations, which occur when locks are not used correctly, can lead to problems like deadlocks and system hangs. Since eBPF operates at the kernel level, errors here have far-reaching consequences.
To tackle this issue, we present Gopher, a tool for detecting locking violations in the eBPF runtime. Gopher uses static analysis to (1) detect cases of context confusion where incorrect locking primitives are used in eBPF helper functions given their execution context, and (2) identify locks in helper functions that can be called recursively using nested eBPF programs. Both of these situations could result in deadlocks. So far, Gopher has identified 34 locking violation bugs in the eBPF subsystem in Linux, only 5 of which were previously found by Syzbot.
This program is tentative and subject to change.
Wed 19 NovDisplayed time zone: Seoul change
14:00 - 15:30 | |||
14:00 10mTalk | Incremental Program Analysis in the Wild: An Empirical Study on Real-World Program Changes Research Papers Xizao Wang Nanjing University, Xiangrong Bin Nanjing University, Lanxin Huang Nanjing University, Shangqing Liu Nanjing University, Jianhua Zhao Nanjing University, China, Lei Bu Nanjing University | ||
14:10 10mTalk | Spinner: Detecting Locking Violations in the eBPF Runtime Research Papers Priya Govindasamy University of California, Irvine, Joseph Bursey University of California, Irvine, Hsin-Wei Hung Meta, Ardalan Amiri Sani University of California, Irvine | ||
14:20 10mTalk | Towards More Accurate Static Analysis for Taint-style Bug Detection in Linux Kernel Research Papers Haonan Li University of California at Riverside, USA, Hang Zhang Indiana University, Kexin Pei The University of Chicago, Zhiyun Qian University of California at Riverside, USA Pre-print | ||
14:30 10mTalk | Automated Insertion of Flushes and Fences for Persistency Research Papers Yutong Guo University of California, Irvine, Weiyu Luo University of California, Irvine, Brian Demsky University of California at Irvine | ||
14:40 10mTalk | DIFFFIX: Incrementally Fixing AST Diffs via Context and Type Information Research Papers Guofeng Zeng University of Science and Technology Beijing, Chang-ai Sun University of Science and Technology Beijing, Kai Gao University of Science and Technology Beijing, Huai Liu Swinburne University of Technology | ||
14:50 10mTalk | Breaking the Traffic Barrier: Unveiling Multi-Format of Protocols via Autonomous Program Exploration Research Papers Dingzhao Xue Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Yibo Qu Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Bowen Jiang Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Xin Chen , Shuaizong Si Institute of Information Engineering of CAS, College of Cyberspace Security, Chinese Academy of Sciences, Shichao Lv Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiqiang Shi Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Limin Sun Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
15:00 10mTalk | Loupe: End-to-End Learning of Loop Unrolling Heuristics for Abstract Interpretation Research Papers Maykel Mattar Université Paris-Saclay, CEA, List / Université Bretagne Sud, IRISA, Michele Alberti CEA, LIST, France, Valentin Perrelle CEA, LIST, France, Salah Sadou IRISA & CNRS, Universite Bretagne Sud,France | ||
15:10 10mTalk | Belief Propagation with Local Structure and Its Applications in Program Analysis Research Papers Yiqian Wu Peking University, China, Yifan Chen Peking University, Yingfei Xiong Peking University, Xin Zhang Peking University | ||
15:20 10mTalk | On the Correctness of Software Merge Research Papers Akira Mori National Institute of Advanced Industrial Science and Technology, Japan, Masatomo Hashimoto Chiba Institute of Technology, Japan | ||