For example, the TCB of an environment based on Xen includes not only the hardware and the hypervisor, but also the management operating system running in the so called Dom0, see Figure 98. System vulnerabilities can be introduced by both software components, Xen and the management operating system. An analysis of Xen vulnerabilities reports that 21 of the 23 attacks were against service components of the control VM [90]; 11 attacks were attributed to problems in the guest OS caused by buffer overflow and 8 were denial of service attacks.
đang được dịch, vui lòng đợi..
