1st Workshop on eBPF and Kernel Extensions
Workshop Program
- Hidden
-
Title: eBPF - The Silent Platform Revolution from Cloud Native
Speaker: Daniel Borkmann (Isovalent)
-
10:10am-10:20am Break
- Hidden
-
10:20am-10:40am TCP's Third Eye: Leveraging eBPF for Telemetry-Powered Congestion Control (full)
Jörn-Thorben Hinz, Vamsi Addanki (TU Berlin), Csaba Györgyi (University of Vienna), Theo Jepsen (Intel), Stefan Schmid (TU Berlin)
-
10:40am-11:00am On Augmenting TCP/IP Stack via eBPF (full)
Sepehr Abbasi Zadeh (University of Toronto, Huawei Technologies Canada Co. Ltd), Ali Munir, Mahmoud Mohamed Bahnasy, Shiva Ketabi (Huawei Technologies Canada Co. Ltd), Yashar Ganjali (University of Toronto, Huawei Technologies Canada Co. Ltd)
-
11:00am-11:20am Schooling NOOBs with eBPF (full)
Joel Sommers (Colgate University), Nolan Rudolph, Ramakrishnan Durairajan (University of Oregon)
-
11:20am-11:30am Break
- Hidden
-
11:30am-11:50am Supercharge WebRTC: Accelerate TURN Services with eBPF/XDP (full)
Tamás Lévai (Budapest University of Technology and Economics, L7mp Technologies), Balázs Edvárd Kreith (Riverside.fm), Gábor Rétvári (Budapest University of Technology and Economics, L7mp Technologies)
-
11:50am-12:10pm HEELS: A Host-Enabled eBPF-Based Load Balancing Scheme (full)
Rui Yang (EPFL), Marios Kogias (Imperial College London & Azure Research)
-
12:10pm-12:20pm eXpress Data Path Extensions for High-Capacity 5G User Plane Functions (short)
Christian Scheich, Marius Corici, Hauke Buhr, Thomas Magedanz (Fraunhofer FOKUS Institute)
-
12:20pm-12:30pm PRAVEGA: Scaling Private 5G RAN via eBPF/XDP (short)
Udhaya Kumar Dayalan, Ziyan Wu, Gaurav Gautam, Feng Tian, Zhi-Li Zhang (University of Minnesota – Twin Cities, USA)
-
12:30pm-1:30pm Lunch
- Hidden
-
Title: TBD
Speaker: Theo Benson (Carnegie Mellon University)
-
2:30pm-2:40pm Break
- Hidden
-
2:40pm-3:00pm Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee (full)
Yutian Wang, Dan Li (Tsinghua University), Li Chen (Zhongguancun Laboratory)
-
3:00pm-3:20pm Comparing Security in eBPF and WebAssembly (full)
Jules Dejaeghere (University of Namur), Bolaji Gbadamosi, Tobias Pulls (Karlstad University), Florentin Rochet (University of Namur)
-
3:20pm-3:40pm Enabling BPF Runtime policies for better BPF management (full)
Raj Sahu, Dan Williams (Virginia Tech)
-
3:40pm-4:00pm Enabling eBPF on Embedded Systems Through Decoupled Verification (full)
Milo Craun, Adam Oswald, Dan Williams (Virginia Tech)
-
4:00pm-4:10pm Break
- Hidden
-
4:10pm-4:30pm Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF (full)
Lars Wüstrich, Markus Schacherbauer, Markus Budeus, Dominik Freiherr von Künßberg, Sebastian Gallenmüller (Technical University of Munich), Marc-Oliver Pahl (IMT Atlantique), Georg Carle (Technical University of Munich)
-
4:30pm-4:50pm RingGuard: Guard io_uring with eBPF (full)
Wanning He (Southern University of Science and Technology), Hongyi Lu (Southern University of Science and Technology (SUSTech)/Hong Kong University of Science and Technology (HKUST)), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Shuai Wang (HKUST)
-
4:50pm-5:10pm Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing (full)
Soo Yee Lim (University of British Columbia), Xueyuan Han (Wake Forest University), Thomas Pasquier (University of British Columbia)
-
5:10pm-5:20pm Practical and Flexible Kernel CFI Enforcement using eBPF (short)
Jinghao Jia, Michael V. Le, Salman Ahmed (IBM Research), Dan Williams (Virginia Tech), Hani Jamjoom (IBM Research)
- Hidden
List of Accepted Papers
-
TCP's Third-Eye: Leveraging eBPF for Telemetry-Powered Congestion Control
Jörn-Thorben Hinz, Vamsi Addanki (TU Berlin), Csaba Györgyi (University of Vienna), Theo Jepsen (Intel), Stefan Schmid (TU Berlin)
-
Schooling NOOBs with eBPF
Joel Sommers (Colgate University), Nolan Rudolph, Ramakrishnan Durairajan (University of Oregon)
-
Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF
Lars Wüstrich, Markus Schacherbauer, Markus Budeus, Dominik Freiherr von Künßberg, Sebastian Gallenmüller (Technical University of Munich), Marc-Oliver Pahl (IMT Atlantique), Georg Carle (Technical University of Munich)
-
Supercharge WebRTC: Accelerate TURN Services with eBPF/XDP
Tamás Lévai (Budapest University of Technology and Economics, L7mp Technologies), Balázs Edvárd Kreith (Riverside.fm), Gábor Rétvári (Budapest University of Technology and Economics, L7mp Technologies)
-
Enabling BPF Runtime policies for better BPF management
Raj Sahu, Dan Williams (Virginia Tech)
-
Enabling eBPF on Embedded Systems Through Decoupled Verification
Milo Craun, Adam Oswald, Dan Williams (Virginia Tech)
-
On Augmenting TCP/IP Stack via eBPF
Sepehr Abbasi Zadeh (University of Toronto, Huawei Technologies Canada Co. Ltd), Ali Munir, Mahmoud Mohamed Bahnasy, Shiva Ketabi (Huawei Technologies Canada Co. Ltd), Yashar Ganjali (University of Toronto, Huawei Technologies Canada Co. Ltd)
-
Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing
Soo Yee Lim (University of British Columbia), Xueyuan Han (Wake Forest University), Thomas Pasquier (University of British Columbia)
-
RingGuard: Guard io_uring with eBPF
Wanning He (Southern University of Science and Technology), Hongyi Lu (Southern University of Science and Technology (SUSTech)/Hong Kong University of Science and Technology (HKUST)), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Shuai Wang (HKUST)
-
Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee
Yutian Wang, Dan Li (Tsinghua University), Li Chen (Zhongguancun Laboratory)
-
Comparing Security in eBPF and WebAssembly
Jules Dejaeghere (University of Namur), Bolaji Gbadamosi, Tobias Pulls (Karlstad University), Florentin Rochet (University of Namur)
-
HEELS: A Host-Enabled eBPF-Based Load Balancing Scheme
Rui Yang (EPFL), Marios Kogias (Imperial College London & Azure Research)
-
Practical and Flexible Kernel CFI Enforcement using eBPF (extended abstract)
Jinghao Jia, Michael V. Le, Salman Ahmed (IBM Research), Dan Williams (Virginia Tech), Hani Jamjoom (IBM Research)
-
eXpress Data Path Extensions for High-Capacity 5G User Plane Functions (extended abstract)
Christian Scheich, Marius Corici, Hauke Buhr, Thomas Magedanz (Fraunhofer FOKUS Institute)
-
PRAVEGA: Scaling Private 5G RAN via eBPF/XDP (extended abstract)
Udhaya Kumar Dayalan, Ziyan Wu, Gaurav Gautam, Feng Tian, Zhi-Li Zhang (University of Minnesota – Twin Cities, USA)
Call for Papers
eBPF (extended Berkeley Packet Filter) is an innovative technology that has been gaining popularity in the networking and operating system community for its flexibility, safety, and efficiency in programming end-host network and OS stacks. Despite the numerous advantages of eBPF, there are several research challenges in leveraging it for novel use cases. These challenges include the difficulty in integrating eBPF into current systems, the potential performance overhead when executed in the kernel, limitations of existing programming hooks and APIs, and the programming restrictions and challenges imposed by the need for safety as enforced by the eBPF verifier. To tackle these issues, a cross-disciplinary approach is necessary, combining techniques across network protocol design, programming languages, operating systems, compilers, hardware architecture, and formal verification.
The workshop aims to bring together experts and practitioners in the field of eBPF, end-host networking, and operating systems to discuss and present the latest advances to support and apply this cutting edge technology. The workshop will consist of invited talks, selected presentations, and a panel discussion to stimulate dialogue and exchange ideas about the use of eBPF to drive the next-generation of data center and cloud technologies. To this end, presenters will be selected from both industry and academia.
Topics of Interest
We welcome submissions including, but not limited to the following topics:- eBPF program development and deployment
- eBPF in network performance analysis and optimization
- eBPF in security and threat management
- Previously unexplored, under-explored, and emerging use cases of eBPF
- Techniques to optimize eBPF programs, for example static or dynamic optimizations
- eBPF-based approaches for improving application efficiency
- Simplifying eBPF programming
- End-to-end network communication optimization using eBPF
- Interaction between eBPF and end-host networking
- eBPF use cases in high-performance networking
- eBPF-based approaches to CPU scheduling
- Security implications and innovations for end-host programmability using eBPF
- Usage of hardware security or performance features to benefit eBPF
- Approaches to improving the in-kernel JIT compiler for eBPF
- Quantitative measurements or comparisons of eBPF to other programmable data plane technologies
- Limitations of the eBPF verifier and approaches to overcome them
- Approaches to scaling eBPF programs in large-scale distributed systems
- Case studies and real-world deployments of eBPF and end-host networking
- Future directions and challenges in eBPF and end-host networking
- Techniques for software or hardware fault isolation in eBPF or related systems
Submission Instructions
The 1st workshop on eBPF and kernel extensions solicits submissions. We are looking for two-types of submissions:
- Research papers of up to 6 pages, including all figures, tables and appendices. Submissions must be original, unpublished work, that have not been concurrently submitted to other venues. Workshop papers will appear in ACM DL as a part of the official proceedings, and are thus considered published work.
- Extended abstracts, which are 2 pages in length (excluded references) submitted in the same format as the workshop papers. We're particularly interested in early-stage findings, position papers and works that are still in progress. This segment is designed for authors to showcase their preliminary or emerging ideas in a concise, impactful manner, and get early-stage feedback at the workshop. As such, these authors will be given the opportunity to present their work in the form of a lighting talk during the workshop.
All two types of papers can use as many additional pages as necessary for citations, and should be written using the two-column 10pt ACM sigconf format (https://github.com/scyue/latex-sigcomm18). All submissions are double-blind. The program committee will review papers to determine relevance to the workshop, quality, and on the likelihood that it will elicit discussion among the attendees. At least one author from each accepted submission must attend the workshop to present and discuss their work.
Please submit your paper via https://ebpf23.hotcrp.com/.
If you have any questions or problems with your submission, please get in touch with Sebastiano Miano (s.miano@qmul.ac.uk) or Srinivas Narayana Ganapathy (sn624@cs.rutgers.edu).
Important Dates
-
June 11, 2023
Submission deadline
-
July 2, 2023
Acceptance notification
-
July 16, 2023
Camera-ready deadline
-
September 10, 2023
Workshop
Workshop Organizing Committee
- Organizers
-
Sebastiano Miano
Queen Mary University of London
-
Srinivas Narayana
Rutgers University
-
Gianni Antichi
Politecnico di Milano
-
Aurojit Panda
New York University
- Technical Program Committee (TPC) Members
-
Roberto Bifulco
NEC
-
Toke Høiland-Jørgensen
Red Hat
-
Olivier Bonaventure
UCLouvain
-
Ben Pfaff
VMware Research
-
Simone Ferlin
RedHat
-
Gábor Rétvári
Budapest University of Technology and Economics
-
Tom Barbette
UCLouvain
-
Fulvio Risso
Politecnico di Torino
-
Sayandeep Sen
IBM Research
-
Theo Benson
CMU
-
Quentin De Coninck
UCLouvain
-
Tamas Levai
Budapest University of Technology and Economics
-
Ryan Stutsman
University of Utah
-
Santosh Nagarakatte
Rutgers University
-
Elazar Gershuni
Technion University
-
Anirudh Sivaraman
New York University
-
Paul Chaignon
Isovalent
-
Xiaoqi Chen
Princeton University
-
Palanivel Kodeswaran
IBM Research
-
Neil Spring
Meta