Return to Article Details Elevated Penetration Attack Models of Virtual Machine Escape Based on FSM Download Download PDF