Advances, Systems and Applications
From: Classifying malware attacks in IaaS cloud environments
Source | Target | ||
---|---|---|---|
External Entity | Virtual machine | Cloud Provider | |
External Entity | - | Bad repositories | - |
Attacks on apps. | |||
Co-location | |||
Attacks on migrated VMs (man-in-the-middle) | |||
Virtual Machine | - | (see Table 3) | |
Cloud Provider | - | Password & key theft | - |
Disk partition access | |||
VMI-based attacks | |||
Hyperjacking | |||
VM theft |