X-Git-Url: http://git.tuebingen.mpg.de/?a=blobdiff_plain;f=OS-Level_Virtualization.m4;h=34d351e5160efe8710f80b86b58542ebea75b165;hb=HEAD;hp=47d5bad22ae2fd52397ef2444d6ec76f807c088c;hpb=afc22623c916f058fbefd86788b0e790f0723adf;p=aple.git diff --git a/OS-Level_Virtualization.m4 b/OS-Level_Virtualization.m4 index 47d5bad..1b43783 100644 --- a/OS-Level_Virtualization.m4 +++ b/OS-Level_Virtualization.m4 @@ -136,7 +136,7 @@ HOMEWORK(« Extended Page Tables.
  • Suppose a hacker gained root access to a VM and wishes to proceed - from there to get also full control over the host OS. Discuss the thread + from there to get also full control over the host OS. Discuss the threat model in the context of the three virtualization frameworks covered in this section.