Fig. 10From: A critical survey of live virtual machine migration techniquesPossible attacks during live VM migrationBack to article page