Fig. 1From: Secure VM management with strong user binding in semi-trusted cloudsThe VM redirection attackBack to article page