Hi Andrea,
Thank you for your reply, and I appreciate you mentioning the Google article.
After reading it, I noticed that the author did not clearly state the
principles
but only provided a few examples in the third paragraph. However, the article
gave me the idea that I could sort and classify
Hi Patrick,
there's a lot of work related to security and exploiting the eBPF
verifier out there.
I'm not an expert myself, but the principles you exposed seem right.
Here there's a nice and recent article about eBPF fuzzing: