<em> Extended Page Tables</em>. </li>
<li> Suppose a hacker gained root access to a VM and wishes to proceed
- from there to get also full control over the host OS. Discuss the thread
+ from there to get also full control over the host OS. Discuss the threat
model in the context of the three virtualization frameworks covered
in this section. </li>