Building the Best Runtime Security from the Kernel
Funded by Balaji Srinivasan former CTO of Coinbase.
We love writing security tools, but no solution in runtime security met the standards we wanted.
What we saw was:
We couldn't find any security solutions that solved these problems, so Bomfather was born…
Bomfather is an eBPF security tool that is built for securing GPUs and runtimes.
Features:
GPUs are critical to machine learning pipelines. Your user data flows through them, expensive proprietary models run on them, and your product hinges on their output.
All of this data on your GPU can be read, tampered with, and exfiltrated by bad actors, there is no in built access control around GPUs. You could use confidential computing (CC), but that adds a 40% runtime overhead and needless complexity. Can you afford to let your proprietary data sit on these GPUs with no protection?
This is where our eBPF protection comes in. With a negligible <2% overhead, It’s a passive process which runs in the background and requires no changes to your workflows.
To set up Bomfather, you write a simple five line policy specifying which programs can access the GPU. Bomfather handles the rest.
We can follow best practices, carefully evaluate dependencies, and write good code. But at some point, there will always be a breach, a zero day, something nobody can stop.
At some point, an attack will compromise your system, steal and manipulate proprietary information and user data. You need a final barrier between your data and attackers.
The Bomfather agent gives you this, a final barrier without any complexity. You write a simple config stating which executables can access your protected resources, start the agent as a background process, and that’s it, complete security without integration hell.