Return to Article Details Security Assessment for Guest-to-Guest and Host-to-Guest Isolation in Type 1 and Type 2 Open-Source Hypervisors: A Focus on Attack Vectors Download Download PDF