ACM SIGCOMM 2023, New York City, US
MENU

1st Workshop on eBPF and Kernel Extensions

Workshop Program

  • Sunday, September 10, 2023

  • 9:00am–9:10am      Session 1: Welcome, Introduction

  • 9:10am–10:10am      Keynote #1

  • Title: eBPF - The Silent Platform Revolution from Cloud Native

    Speaker: Daniel Borkmann (Isovalent)

  • 10:10am-10:20am Break

  • 10:20am–11:20pm      Session 2: Telemetry for Networking (Session Chair: Gianni Antichi)

  • 10:20am-10:40am

    TCP's Third Eye: Leveraging eBPF for Telemetry-Powered Congestion Control (full)

    Jörn-Thorben Hinz, Vamsi Addanki (TU Berlin), Csaba Györgyi (University of Vienna), Theo Jepsen (Intel), Stefan Schmid (TU Berlin)

  • 10:40am-11:00am

    On Augmenting TCP/IP Stack via eBPF (full)

    Sepehr Abbasi Zadeh (University of Toronto, Huawei Technologies Canada Co. Ltd), Ali Munir, Mahmoud Mohamed Bahnasy, Shiva Ketabi (Huawei Technologies Canada Co. Ltd), Yashar Ganjali (University of Toronto, Huawei Technologies Canada Co. Ltd)

  • 11:00am-11:20am

    Schooling NOOBs with eBPF (full)

    Joel Sommers (Colgate University), Nolan Rudolph, Ramakrishnan Durairajan (University of Oregon)

  • 11:20am-11:30am Break

  • 11:30am–12:30pm      Session 3: New Use Cases (Session Chair: Xiaoqi Chen)

  • 11:30am-11:50am

    Supercharge WebRTC: Accelerate TURN Services with eBPF/XDP (full)

    Tamás Lévai (Budapest University of Technology and Economics, L7mp Technologies), Balázs Edvárd Kreith (Riverside.fm), Gábor Rétvári (Budapest University of Technology and Economics, L7mp Technologies)

  • 11:50am-12:10pm

    HEELS: A Host-Enabled eBPF-Based Load Balancing Scheme (full)

    Rui Yang (EPFL), Marios Kogias (Imperial College London & Azure Research)

  • 12:10pm-12:20pm

    eXpress Data Path Extensions for High-Capacity 5G User Plane Functions (short)

    Christian Scheich, Marius Corici, Hauke Buhr, Thomas Magedanz (Fraunhofer FOKUS Institute)

  • 12:20pm-12:30pm

    PRAVEGA: Scaling Private 5G RAN via eBPF/XDP (short)

    Udhaya Kumar Dayalan, Ziyan Wu, Gaurav Gautam, Feng Tian, Zhi-Li Zhang (University of Minnesota – Twin Cities, USA)

  • 12:30pm-1:30pm Lunch

  • 1:30pm–2:30pm      Keynote #2

  • Title: TBD

    Speaker: Theo Benson (Carnegie Mellon University)

  • 2:30pm-2:40pm Break

  • 2:40pm–4:00pm      Session 4: Security for eBPF (Session Chair: Tamas Levai)

  • 2:40pm-3:00pm

    Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee (full)

    Yutian Wang, Dan Li (Tsinghua University), Li Chen (Zhongguancun Laboratory)

  • 3:00pm-3:20pm

    Comparing Security in eBPF and WebAssembly (full)

    Jules Dejaeghere (University of Namur), Bolaji Gbadamosi, Tobias Pulls (Karlstad University), Florentin Rochet (University of Namur)

  • 3:20pm-3:40pm

    Enabling BPF Runtime policies for better BPF management (full)

    Raj Sahu, Dan Williams (Virginia Tech)

  • 3:40pm-4:00pm

    Enabling eBPF on Embedded Systems Through Decoupled Verification (full)

    Milo Craun, Adam Oswald, Dan Williams (Virginia Tech)

  • 4:00pm-4:10pm Break

  • 4:10pm–5:20pm      Session 5: eBPF for Security (Session Chair: Aurojit Panda)

  • 4:10pm-4:30pm

    Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF (full)

    Lars Wüstrich, Markus Schacherbauer, Markus Budeus, Dominik Freiherr von Künßberg, Sebastian Gallenmüller (Technical University of Munich), Marc-Oliver Pahl (IMT Atlantique), Georg Carle (Technical University of Munich)

  • 4:30pm-4:50pm

    RingGuard: Guard io_uring with eBPF (full)

    Wanning He (Southern University of Science and Technology), Hongyi Lu (Southern University of Science and Technology (SUSTech)/Hong Kong University of Science and Technology (HKUST)), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Shuai Wang (HKUST)

  • 4:50pm-5:10pm

    Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing (full)

    Soo Yee Lim (University of British Columbia), Xueyuan Han (Wake Forest University), Thomas Pasquier (University of British Columbia)

  • 5:10pm-5:20pm

    Practical and Flexible Kernel CFI Enforcement using eBPF (short)

    Jinghao Jia, Michael V. Le, Salman Ahmed (IBM Research), Dan Williams (Virginia Tech), Hani Jamjoom (IBM Research)

  • 5:20pm–5:30pm      Closing Remarks

List of Accepted Papers

  • TCP's Third-Eye: Leveraging eBPF for Telemetry-Powered Congestion Control

    Jörn-Thorben Hinz, Vamsi Addanki (TU Berlin), Csaba Györgyi (University of Vienna), Theo Jepsen (Intel), Stefan Schmid (TU Berlin)

  • Schooling NOOBs with eBPF

    Joel Sommers (Colgate University), Nolan Rudolph, Ramakrishnan Durairajan (University of Oregon)

  • Network Profiles for Detecting Application-Characteristic Behavior Using Linux eBPF

    Lars Wüstrich, Markus Schacherbauer, Markus Budeus, Dominik Freiherr von Künßberg, Sebastian Gallenmüller (Technical University of Munich), Marc-Oliver Pahl (IMT Atlantique), Georg Carle (Technical University of Munich)

  • Supercharge WebRTC: Accelerate TURN Services with eBPF/XDP

    Tamás Lévai (Budapest University of Technology and Economics, L7mp Technologies), Balázs Edvárd Kreith (Riverside.fm), Gábor Rétvári (Budapest University of Technology and Economics, L7mp Technologies)

  • Enabling BPF Runtime policies for better BPF management

    Raj Sahu, Dan Williams (Virginia Tech)

  • Enabling eBPF on Embedded Systems Through Decoupled Verification

    Milo Craun, Adam Oswald, Dan Williams (Virginia Tech)

  • On Augmenting TCP/IP Stack via eBPF

    Sepehr Abbasi Zadeh (University of Toronto, Huawei Technologies Canada Co. Ltd), Ali Munir, Mahmoud Mohamed Bahnasy, Shiva Ketabi (Huawei Technologies Canada Co. Ltd), Yashar Ganjali (University of Toronto, Huawei Technologies Canada Co. Ltd)

  • Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing

    Soo Yee Lim (University of British Columbia), Xueyuan Han (Wake Forest University), Thomas Pasquier (University of British Columbia)

  • RingGuard: Guard io_uring with eBPF

    Wanning He (Southern University of Science and Technology), Hongyi Lu (Southern University of Science and Technology (SUSTech)/Hong Kong University of Science and Technology (HKUST)), Fengwei Zhang (Southern University of Science and Technology (SUSTech)), Shuai Wang (HKUST)

  • Seeing the Invisible: Auditing eBPF Programs in Hypervisor with HyperBee

    Yutian Wang, Dan Li (Tsinghua University), Li Chen (Zhongguancun Laboratory)

  • Comparing Security in eBPF and WebAssembly

    Jules Dejaeghere (University of Namur), Bolaji Gbadamosi, Tobias Pulls (Karlstad University), Florentin Rochet (University of Namur)

  • HEELS: A Host-Enabled eBPF-Based Load Balancing Scheme

    Rui Yang (EPFL), Marios Kogias (Imperial College London & Azure Research)

  • Practical and Flexible Kernel CFI Enforcement using eBPF (extended abstract)

    Jinghao Jia, Michael V. Le, Salman Ahmed (IBM Research), Dan Williams (Virginia Tech), Hani Jamjoom (IBM Research)

  • eXpress Data Path Extensions for High-Capacity 5G User Plane Functions (extended abstract)

    Christian Scheich, Marius Corici, Hauke Buhr, Thomas Magedanz (Fraunhofer FOKUS Institute)

  • PRAVEGA: Scaling Private 5G RAN via eBPF/XDP (extended abstract)

    Udhaya Kumar Dayalan, Ziyan Wu, Gaurav Gautam, Feng Tian, Zhi-Li Zhang (University of Minnesota – Twin Cities, USA)

Call for Papers

eBPF (extended Berkeley Packet Filter) is an innovative technology that has been gaining popularity in the networking and operating system community for its flexibility, safety, and efficiency in programming end-host network and OS stacks. Despite the numerous advantages of eBPF, there are several research challenges in leveraging it for novel use cases. These challenges include the difficulty in integrating eBPF into current systems, the potential performance overhead when executed in the kernel, limitations of existing programming hooks and APIs, and the programming restrictions and challenges imposed by the need for safety as enforced by the eBPF verifier. To tackle these issues, a cross-disciplinary approach is necessary, combining techniques across network protocol design, programming languages, operating systems, compilers, hardware architecture, and formal verification.

The workshop aims to bring together experts and practitioners in the field of eBPF, end-host networking, and operating systems to discuss and present the latest advances to support and apply this cutting edge technology. The workshop will consist of invited talks, selected presentations, and a panel discussion to stimulate dialogue and exchange ideas about the use of eBPF to drive the next-generation of data center and cloud technologies. To this end, presenters will be selected from both industry and academia.

Topics of Interest

We welcome submissions including, but not limited to the following topics:
  • eBPF program development and deployment
  • eBPF in network performance analysis and optimization
  • eBPF in security and threat management
  • Previously unexplored, under-explored, and emerging use cases of eBPF
  • Techniques to optimize eBPF programs, for example static or dynamic optimizations
  • eBPF-based approaches for improving application efficiency
  • Simplifying eBPF programming
  • End-to-end network communication optimization using eBPF
  • Interaction between eBPF and end-host networking
  • eBPF use cases in high-performance networking
  • eBPF-based approaches to CPU scheduling
  • Security implications and innovations for end-host programmability using eBPF
  • Usage of hardware security or performance features to benefit eBPF
  • Approaches to improving the in-kernel JIT compiler for eBPF
  • Quantitative measurements or comparisons of eBPF to other programmable data plane technologies
  • Limitations of the eBPF verifier and approaches to overcome them
  • Approaches to scaling eBPF programs in large-scale distributed systems
  • Case studies and real-world deployments of eBPF and end-host networking
  • Future directions and challenges in eBPF and end-host networking
  • Techniques for software or hardware fault isolation in eBPF or related systems

Submission Instructions

The 1st workshop on eBPF and kernel extensions solicits submissions. We are looking for two-types of submissions:

  • Research papers of up to 6 pages, including all figures, tables and appendices. Submissions must be original, unpublished work, that have not been concurrently submitted to other venues. Workshop papers will appear in ACM DL as a part of the official proceedings, and are thus considered published work.
  • Extended abstracts, which are 2 pages in length (excluded references) submitted in the same format as the workshop papers. We're particularly interested in early-stage findings, position papers and works that are still in progress. This segment is designed for authors to showcase their preliminary or emerging ideas in a concise, impactful manner, and get early-stage feedback at the workshop. As such, these authors will be given the opportunity to present their work in the form of a lighting talk during the workshop.

All two types of papers can use as many additional pages as necessary for citations, and should be written using the two-column 10pt ACM sigconf format (https://github.com/scyue/latex-sigcomm18). All submissions are double-blind. The program committee will review papers to determine relevance to the workshop, quality, and on the likelihood that it will elicit discussion among the attendees. At least one author from each accepted submission must attend the workshop to present and discuss their work.

Please submit your paper via https://ebpf23.hotcrp.com/.

If you have any questions or problems with your submission, please get in touch with Sebastiano Miano (s.miano@qmul.ac.uk) or Srinivas Narayana Ganapathy (sn624@cs.rutgers.edu).

Important Dates

  • June 11, 2023

    Submission deadline

  • July 2, 2023

    Acceptance notification

  • July 16, 2023

    Camera-ready deadline

  • September 10, 2023

    Workshop

Workshop Organizing Committee

  • Organizers
  • Sebastiano Miano

    Queen Mary University of London

  • Srinivas Narayana

    Rutgers University

  • Gianni Antichi

    Politecnico di Milano

  • Aurojit Panda

    New York University

  • Technical Program Committee (TPC) Members
  • Roberto Bifulco

    NEC

  • Toke Høiland-Jørgensen

    Red Hat

  • Olivier Bonaventure

    UCLouvain

  • Ben Pfaff

    VMware Research

  • Simone Ferlin

    RedHat

  • Gábor Rétvári

    Budapest University of Technology and Economics

  • Tom Barbette

    UCLouvain

  • Fulvio Risso

    Politecnico di Torino

  • Sayandeep Sen

    IBM Research

  • Theo Benson

    CMU

  • Quentin De Coninck

    UCLouvain

  • Tamas Levai

    Budapest University of Technology and Economics

  • Ryan Stutsman

    University of Utah

  • Santosh Nagarakatte

    Rutgers University

  • Elazar Gershuni

    Technion University

  • Anirudh Sivaraman

    New York University

  • Paul Chaignon

    Isovalent

  • Xiaoqi Chen

    Princeton University

  • Palanivel Kodeswaran

    IBM Research

  • Neil Spring

    Meta