Need a malicious hypervisor
You need a malicious hypervisor for this to work.
How hard is it to make a hypervisor malicious? What is needed? Do we have studies or examples of it?
You need a malicious hypervisor for this to work.
How hard is it to make a hypervisor malicious? What is needed? Do we have studies or examples of it?