(Downloads - 0)
For more info about our services contact : help@bestpfe.com
Table of contents
1 Introduction
1.1 Problem definition
1.1.1 Research Question
1.1.2 Delimitations and scope
1.1.3 Ethics and sustainability
1.1.4 Thesis outline
2 Related work
3 Background
3.1 Cloud computing
3.1.1 Deployments models
3.2 Probabilistic Threat modelling
3.2.1 Mathematical formalism of the Meta attack language
3.3 The Meta attack language
3.3.1 coreLang
4 Methodology
4.1 Domain Survey
4.1.1 Attack Lists
4.1.2 Creation of Domain-specific language
4.1.3 Evaluation
5 Domain Survey
5.1 OpenStack
5.2 Hypervisor
5.2.1 Instances
5.3 SELinux & sVirt
5.3.1 Secure Virtualisation
6 Results
6.1 Feature Matrix and Attack Lists
6.1.1 Feature Matrix
6.1.2 Attack and defence lists
6.2 HypervisorLang
6.2.1 coreLang
6.2.2 HypervisorLang
7 Evaluation
7.1 Evaluation of Testcases
7.1.1 Example test case 1 – Access to Instance
7.1.2 Example test case 2 – Breakout from Instance
7.1.3 Example test case 3 – Access to host
8 Discussion
8.1 Completness of HypervisorLang
8.2 Completness of Attack Lists and Defenses
8.3 Completeness of testing
8.4 Using MAL as a base for HypervisorLang
8.5 Regarding the works of HypervisorLang
9 Conclusion and future work
9.1 Conclusion
9.2 Future work
Bibliography
A Test-Cases
B Core
C HyperVisorLang
D Testmodel
D.1 TestCase1 in Result
D.2 test2
D.3 test3




