In a hypervisor attack, the attacker tries to attack the hypervisor directly. The hypervisor, which is often a stripped-down operating system, has direct access to the system hardware, and it brokers all access between the various virtualized systems and the hardware devices. If the hypervisor can be compromised, then the attacker may be able to compromise any or all of the virtualized systems controlled by that hypervisor.
Attributes | Values |
---|---|
rdfs:label |
|
rdfs:comment |
|
dcterms:subject | |
abstract |
|