
The ARMO research team recently revealed significant flaws in Linux runtime security tools, confirming that the io_uring interface allows rootkits (kernel-level malware) to bypass conventional monitoring solutions.Tests show that mainstream tools, including Falco, Tetragon, and even Microsoft Defender for Endpoint, are unable to detect attacks utilizing this mechanism.
01
Technical Principles
“This mechanism allows user-space applications to perform various operations without triggering system calls,” ARMO explained. As a high-performance asynchronous I/O interface introduced in Linux 5.1, io_uring significantly reduces overhead by sharing a ring buffer between user space and kernel space. However, it is precisely this design feature that allows it to bypass the system call monitoring mechanisms that are the cornerstone of most Linux security tools.
02
Proof of Concept
To validate the threat, ARMO developed a fully functional rootkit tool called Curing, which communicates with a C2 server solely through io_uring operations, with zero system calls throughout. Experiments demonstrated that attackers could achieve:
- Data theft
- Remote command execution
- Network lateral movement
while traditional monitoring tools remain completely oblivious.
03
Product Testing Results
Testing of various open-source and commercial Linux security products exposed serious flaws:
- Falco:Completely unaware of io_uring-based operations
- Tetragon:The default policy misses io_uring activities and requires manual configuration of Kprobes and LSM hooks to enhance visibility
- Microsoft Defender for Endpoint:Even when io_uring is abused, it can only monitor file changes through Fanotify
04
Industry Status Reflection
Current Linux EDR (Endpoint Detection and Response) tools generally rely on eBPF proxies, prioritizing the convenience of monitoring system calls. ARMO points out a fundamental architectural flaw: “Most security vendors have yet to address this issue; they continue to rely on simple and direct solutions that cannot cope with the diversity of application and kernel characteristics.”
05
Mitigation Recommendations
The research team proposed three improvement strategies:
- Monitoring abnormal io_uring usage:Flagging unconventional io_uring calls in applications
- Adopting KRSI (Kernel Runtime Security Instrumentation):Integrating with the Linux LSM framework to obtain structured kernel events
- Hooking techniques beyond system calls:Utilizing stable Kprobes and other hook points to expand kernel monitoring coverage
ARMO particularly emphasizes the advantages of KRSI: “Unlike directly hooking system calls, LSM hooks can provide more consistent and reliable coverage for security-related operations.” This finding serves as a wake-up call for the Linux security ecosystem, highlighting the critical lag between modern kernel features and security protections.





