Embedded Israel #20 - Linux kernel and userspace tracing mechanisms and eBPF


Details
Embedded Israel, CNCF TLV and Kernel TLV are joining forces at Aqua Security's offices, for yet another celebration of the intersection of Open Source and Operating System Internals.
There is still room for one more lecture, and if you think you really know your way around Linux tracing mechanisms, ancient, old, current, and new - you are welcome to also take Ron's spot.
You are also welcome to quickly show-off your success (and failure) stories, in a lightning talk.
To submit a talk for this meetup or a future one, please use the CFP form
AGENDA
17:30-18:00: Gathering
18:00-18:45: Linux kernel (and userspace) tracing and debugging mechanisms (Ron Munitz @ The PSCG)
In this introductory talk, I will give some practical examples of some of the tracing mechanisms available in Linux and Android. kernel space and userspace. As time is limited, the session will likely be followed up by subsequent talks, in particular, a Linux Kernel Debugging one at our planned Linux Kernel meetup on May (TBA).
18:45-19:30: Applied security using Tracing | Shoham Biton & Ofek Shaked @ Aqua Security)
eBPF is a powerful and flexible capability that allows us to observe everything that is happening in the system and extract any kind of information we want, which makes it a perfect platform to build upon next-generation security systems. In this talk we will introduce how Aqua Security leverages eBPF to analyze and investigate security incidents, and also use it to build security systems that detect and protect against those findings.
19:30-EOF - Lightning talks and more networking!

Canceled
Embedded Israel #20 - Linux kernel and userspace tracing mechanisms and eBPF