\BOOKMARK [0][-]{chapter.1}{Introduction}{}% 1 \BOOKMARK [1][-]{section.1.1}{Motivation}{chapter.1}% 2 \BOOKMARK [1][-]{section.1.2}{Project\040objectives}{chapter.1}% 3 \BOOKMARK [1][-]{section.1.3}{Regulatory\040framework}{chapter.1}% 4 \BOOKMARK [2][-]{subsection.1.3.1}{Social\040and\040economic\040environment}{section.1.3}% 5 \BOOKMARK [2][-]{subsection.1.3.2}{Budget}{section.1.3}% 6 \BOOKMARK [1][-]{section.1.4}{Structure\040of\040the\040document}{chapter.1}% 7 \BOOKMARK [0][-]{chapter.2}{State\040of\040the\040art}{}% 8 \BOOKMARK [1][-]{section.2.1}{eBPF\040history\040-\040Classic\040BPF}{chapter.2}% 9 \BOOKMARK [2][-]{subsection.2.1.1}{Introduction\040to\040the\040BPF\040system}{section.2.1}% 10 \BOOKMARK [2][-]{subsection.2.1.2}{The\040BPF\040virtual\040machine}{section.2.1}% 11 \BOOKMARK [2][-]{subsection.2.1.3}{Analysis\040of\040a\040BPF\040filter\040program}{section.2.1}% 12 \BOOKMARK [2][-]{subsection.2.1.4}{BPF\040bytecode\040instruction\040format}{section.2.1}% 13 \BOOKMARK [2][-]{subsection.2.1.5}{An\040example\040of\040BPF\040filter\040with\040tcpdump}{section.2.1}% 14 \BOOKMARK [1][-]{section.2.2}{Analysis\040of\040modern\040eBPF}{chapter.2}% 15 \BOOKMARK [2][-]{subsection.2.2.1}{eBPF\040instruction\040set}{section.2.2}% 16 \BOOKMARK [2][-]{subsection.2.2.2}{JIT\040compilation}{section.2.2}% 17 \BOOKMARK [2][-]{subsection.2.2.3}{The\040eBPF\040verifier}{section.2.2}% 18 \BOOKMARK [2][-]{subsection.2.2.4}{eBPF\040maps}{section.2.2}% 19 \BOOKMARK [2][-]{subsection.2.2.5}{The\040eBPF\040ring\040buffer}{section.2.2}% 20 \BOOKMARK [2][-]{subsection.2.2.6}{The\040bpf\(\)\040syscall}{section.2.2}% 21 \BOOKMARK [2][-]{subsection.2.2.7}{eBPF\040helpers}{section.2.2}% 22 \BOOKMARK [1][-]{section.2.3}{eBPF\040program\040types}{chapter.2}% 23 \BOOKMARK [2][-]{subsection.2.3.1}{XDP}{section.2.3}% 24 \BOOKMARK [2][-]{subsection.2.3.2}{Traffic\040Control}{section.2.3}% 25 \BOOKMARK [2][-]{subsection.2.3.3}{Tracepoints}{section.2.3}% 26 \BOOKMARK [2][-]{subsection.2.3.4}{Kprobes}{section.2.3}% 27 \BOOKMARK [2][-]{subsection.2.3.5}{Uprobes}{section.2.3}% 28 \BOOKMARK [1][-]{section.2.4}{Developing\040eBPF\040programs}{chapter.2}% 29 \BOOKMARK [2][-]{subsection.2.4.1}{BCC}{section.2.4}% 30 \BOOKMARK [2][-]{subsection.2.4.2}{Bpftool}{section.2.4}% 31 \BOOKMARK [2][-]{subsection.2.4.3}{Libbpf}{section.2.4}% 32 \BOOKMARK [0][-]{chapter.3}{Analysis\040of\040offensive\040capabilities}{}% 33 \BOOKMARK [0][-]{chapter.4}{Methods??}{}% 34 \BOOKMARK [0][-]{chapter.5}{Results}{}% 35 \BOOKMARK [0][-]{chapter.6}{Conclusion\040and\040future\040work}{}% 36 \BOOKMARK [0][-]{chapter.6}{Bibliography}{}% 37