vulnerabilities Flashcards

1
Q

An attacker can use the victim’s account to get access to the target’s resources

A

Identity and Access Management Guidance [65] Dynamic credential [66]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data from hard drives that are shared by several customers cannot be completely removed.

A

Specify destruction strategies on Service-level Agreements (SLAs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authors in [58] illustrated the steps necessary to gain confidential information from other VMs co-located in the same server as the attacker.

A

FRS techniques [67] Digital Signatures [68]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Side channel [69]

A

Encryption [69] Homomorphic encryption [70]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker can request more computational resources, so other legal users are not able to get additional capacity.

A

Cloud providers can force policies to offer limited computational resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Some examples are described in [32] such as SQL, command injection, and cross-site scripting

A

Web application scanners [71]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A zero-day exploit in the HyperVM virtualization application that destroyed about 100,000 websites [72]

A

HyperSafe [60] TCCP (Trusted Cloud Computing Platform) [63] TVDc (Trusted Virtual Datacenter) [73,74]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

[75] presents a study that demonstrates security flaws in most virtual machines monitors

A

none

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An attacker can create a VM image containing malware and publish it in a public repository.

A

Mirage [49]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

[76] has empirically showed attacks against the migration functionality of the latest version of the Xen and VMware virtualization products.

A

PALM [64] TCCP [63] VNSS [52]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Sniffing and spoofing virtual networks [51]

A

Virtual network framework based on Xen network modes: “bridged” and “routed” [51]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly