“…To address this limitation, a virtualisation hypervisor mediates access between guest OSs and the physical compute resources. However, hypervisors, themselves, have displayed signs of vulnerabilities that have enabled the guest OSs to gain inappropriate levels of co n tro l or influence on the underlying platform (Alliance, Coud Sercurity, 2010;M o n tasari, et al, 2018b;Montasari, et al, 2019a;Montasari, et al, 2019e;Montasari, et al, 2019f;Montasari, et al, 2019g). The following sub sections describe various scenarios in which flaws in hypervisors can be exploited to perpetrate cyber-attacks in CCEs.…”