diff --git a/docs/chapters/chapter3.tex b/docs/chapters/chapter3.tex index a807ae7..b85b919 100644 --- a/docs/chapters/chapter3.tex +++ b/docs/chapters/chapter3.tex @@ -1,4 +1,4 @@ -\chapter{Analysis of offensive capabilities} \label{chapter:analysis_offensive_capabilities} +\chapter{Analysis of offensive capabilities of eBPF} \label{chapter:analysis_offensive_capabilities} In the previous chapter, we detailed which functionalities eBPF offers and studied its underlying architecture. As with every technology, a prior deep understanding is fundamental for discussing its security implications. Therefore, given the previous background, this chapter is dedicated to an analysis in detail of the security implications of a malicious use of eBPF. For this, we will firstly explore the security features incorporated in the eBPF system. Then, we will identify the fundamental pillars onto which malware can build their functionality. As we mentioned during the project goals, these main topics of research will be the following: