Content deleted Content added
PaleoNeonate (talk | contribs) Merge redundant citations - You can help! |
→Privilege escalation: +see also to Hardware backdoor |
||
Line 188:
==== Privilege escalation ====
{{See also|Hardware backdoor}}
A simple and generic processor backdoor can be used by attackers as a means to privilege escalation to get to privileges equivalent to those of any given running operating system.<ref name="Dufl21">[[#Dufl2|Duflot, 2008, p.1]]</ref> Also, a non-privileged process of one of the non-privileged invited ___domain running on top of a virtual machine monitor can get to privileges equivalent to those of the virtual machine monitor.<ref name="Dufl21"/>
|