Research Article

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Figure 19

(a) Screenshot of the scan of vhd-util and (b) coalesce both images into one image.
(a)
(b)