Research report and presentation that examines the “state of the art” techniques used to gain access and escalate privileges in public cloud-based environments. The report should address Google, Amazon, and Azure cloud environments. The paper should also examine recommended strategies to mitigate these risks. Include practical components in your research such as demo of exploitation, code analysis, and attack detection. You should have the written paper AND the hands-on component. (x0.75-0.85)