ch 3 title change

This commit is contained in:
jet
2022-06-14 11:34:58 +02:00
parent 163f923c55
commit 473b9af279

View File

@@ -1,4 +1,4 @@
\chapter{Analysis of offensive capabilities} \label{chapter:analysis_offensive_capabilities}
\chapter{Analysis of offensive capabilities of eBPF} \label{chapter:analysis_offensive_capabilities}
In the previous chapter, we detailed which functionalities eBPF offers and studied its underlying architecture. As with every technology, a prior deep understanding is fundamental for discussing its security implications.
Therefore, given the previous background, this chapter is dedicated to an analysis in detail of the security implications of a malicious use of eBPF. For this, we will firstly explore the security features incorporated in the eBPF system. Then, we will identify the fundamental pillars onto which malware can build their functionality. As we mentioned during the project goals, these main topics of research will be the following: