Virtual Machine (VM) Security in Cloud Infrastructures

1. Dynamic VM Creation and Security Challenges

2. Variability of Virtual Machine Configurations

3. VM-Specific Security Vulnerabilities

4. VM Isolation and VM Escape

Example: Pwn2Own 2017 VM Escape Attack

5. Resource Reuse Concerns

Security Risk in Resource Sharing