COmpleted document structure and code availability

This commit is contained in:
h3xduck
2022-06-22 11:49:22 -04:00
parent d019e6168a
commit d9192c06ab
4 changed files with 59 additions and 6 deletions

View File

@@ -1,4 +1,4 @@
\chapter{Analysis of offensive capabilities} \label{chapter:analysis_offensive_capabilities}
\chapter{Analysis of offensive capabilities of eBPF} \label{chapter:analysis_offensive_capabilities}
In the previous chapter, we detailed which functionalities eBPF offers and studied its underlying architecture. As with every technology, a prior deep understanding is fundamental for discussing its security implications.
Therefore, given the previous background, this chapter is dedicated to an analysis in detail of the security implications of a malicious use of eBPF. For this, we will firstly explore the security features incorporated in the eBPF system. Then, we will identify the fundamental pillars onto which malware can build their functionality. As we mentioned during the project goals, these main topics of research will be the following: