
Cassagnes, C., Trestioreanu, L., Joly, C., and State, R.
(2020). The rise of ebpf for non-intrusive performance
monitoring. In NOMS 2020-2020 IEEE/IFIP Network
Operations and Management Symposium, pages 1–7.
IEEE.
Cohen, M. (2017). Scanning memory with yara. Digital
Investigation, 20:34–43.
De Giorgi, M. (2023). System calls monitoring in android:
An approach to detect debuggers, anomalies and pri-
vacy issues.
Durve, R. and Bouridane, A. (2017). Windows 10 se-
curity hardening using device guard whitelisting and
applocker blacklisting. In 2017 Seventh Interna-
tional Conference on Emerging Security Technologies
(EST), pages 56–61. IEEE.
Findlay, W., Somayaji, A., and Barrera, D. (2020). Bpf-
box: Simple precise process confinement with ebpf.
In Proceedings of the 2020 ACM SIGSAC Conference
on Cloud Computing Security Workshop, pages 91–
103.
Fournier, G. (2023). ebpfkit. https://github.com/Gui774u
me/ebpfkit. Accessed: 21.11.2023.
Fournier, G., Afchain, S., and Baubeau, S. (2021). Runtime
security monitoring with ebpf. In 17th SSTIC Sympo-
sium sur la S
´
ecurit
´
e des Technologies de l’Information
et de la Communication.
Ganesan, R., Murarka, Y., Sarkar, S., and Frey, K. (2013).
Empirical study of performance benefits of hardware
assisted virtualization. In Proceedings of the 6th ACM
India Computing Convention, pages 1–8.
Gowtham, V., Keil, O., Yeole, A., Schreiner, F., Tsch
¨
oke,
S., and Willner, A. (2021). Determining edge node
real-time capabilities. In 2021 IEEE/ACM 25th In-
ternational Symposium on Distributed Simulation and
Real Time Applications (DS-RT), pages 1–9. IEEE.
Hili, G., Mayes, K., and Markantonakis, K. (2014). The
bios and rootkits. Secure Smart Embedded Devices,
Platforms and Applications, pages 369–381.
Karvandi, M. S., Gholamrezaei, M., Khalaj Monfared, S.,
Meghdadizanjani, S., Abbassi, B., Amini, A., Mor-
tazavi, R., Gorgin, S., Rahmati, D., and Schwarz, M.
(2022). Hyperdbg: Reinventing hardware-assisted de-
bugging. In Proceedings of the 2022 ACM SIGSAC
Conference on Computer and Communications Secu-
rity, pages 1709–1723.
Kiperberg, M., Leon, R., Resh, A., Algawi, A., and Zaiden-
berg, N. (2019). Hypervisor-assisted atomic memory
acquisition in modern systems. In International Con-
ference on Information Systems Security and Privacy.
SCITEPRESS Science And Technology Publications.
Li, X., Wen, Y., Huang, M. H., and Liu, Q. (2011). An
overview of bootkit attacking approaches. In 2011
Seventh International Conference on Mobile Ad-hoc
and Sensor Networks, pages 428–431. IEEE.
Martignoni, L., Fattori, A., Paleari, R., and Cavallaro, L.
(2010). Live and trustworthy forensic analysis of com-
modity production systems. In Recent Advances in
Intrusion Detection: 13th International Symposium,
RAID 2010, Ottawa, Ontario, Canada, September 15-
17, 2010. Proceedings 13, pages 297–316. Springer.
Miano, S., Risso, F., Bernal, M. V., Bertrone, M., and Lu,
Y. (2021). A framework for ebpf-based network func-
tions in an era of microservices. IEEE Transactions on
Network and Service Management, 18(1):133–151.
Mohanta, A., Saldanha, A., Mohanta, A., and Saldanha, A.
(2020). Memory forensics with volatility. Malware
Analysis and Detection Engineering: A Comprehen-
sive Approach to Detect and Analyze Modern Mal-
ware, pages 433–476.
Neiger, G. (2006). Intel
ˆ
Wvirtualization technology: Hard-
ware support for efficient processor virtualization. In-
tel Technology Journal.
N
´
ova, K. (2023). Boopkit. https://github.com/krisnova/bo
opkit. Accessed: 21.11.2023.
Palutke, R., Block, F., Reichenberger, P., and Stripeika, D.
(2020). Hiding process memory via anti-forensic tech-
niques. Forensic Science International: Digital Inves-
tigation, 33:301012.
PatH (2022). Bad bpf. https://github.com/pathtofile/bad-b
pf. Accessed: 21.11.2023.
Qi, Z., Xiang, C., Ma, R., Li, J., Guan, H., and Wei, D. S.
(2016). Forenvisor: A tool for acquiring and preserv-
ing reliable data in cloud live forensics. IEEE Trans-
actions on Cloud Computing, 5(3):443–456.
Rutkowska, J. (2006). Introducing blue pill. The official
blog of the invisiblethings. org, 22:23.
Scholz, D., Raumer, D., Emmerich, P., Kurtz, A., Lesiak,
K., and Carle, G. (2018). Performance implications of
packet filtering with linux ebpf. In 2018 30th Interna-
tional Teletraffic Congress (ITC 30), volume 1, pages
209–217. IEEE.
Security, A. (2023). Tracee. https://github.com/aquasecurit
y/tracee. Accessed: 21.11.2023.
Stadlinger, J., Dewald, A., and Block, F. (2018). Linux
memory forensics: Expanding rekall for userland in-
vestigation. In 2018 11th International Conference
on IT Security Incident Management & IT Forensics
(IMF), pages 27–46. IEEE.
St
¨
uttgen, J. and Cohen, M. (2014). Robust linux memory
acquisition with minimal target impact. Digital Inves-
tigation, 11:S112–S119.
Tobin, P. C., Le-Khac, N., and Kechadi, T. (2017). Foren-
sic analysis of virtual hard drives. Journal of Digital
Forensics, Security and Law.
Van Geffen, J., Nelson, L., Dillig, I., Wang, X., and Tor-
lak, E. (2020). Synthesizing jit compilers for in-kernel
dsls. In International Conference on Computer Aided
Verification, pages 564–586. Springer.
Yehuda, R. B., Shlingbaum, E., Gershfeld, Y., Tayouri, S.,
and Zaidenberg, N. J. (2021). Hypervisor memory
acquisition for arm. Forensic Science International:
Digital Investigation, 37:301106.
Zaidenberg, N. J. and Khen, E. (2015). Detecting kernel
vulnerabilities during the development phase. In 2015
IEEE 2nd International Conference on Cyber Security
and Cloud Computing, pages 224–230.
Zhang, L., Wang, L., Zhang, R., Zhang, S., and Zhou, Y.
(2010). Live memory acquisition through firewire. In
International Conference on Forensics in Telecommu-
nications, Information, and Multimedia, pages 159–
167. Springer.
Detecting eBPF Rootkits Using Virtualization and Memory Forensics
261