This document summarizes security vulnerabilities in the Xen hypervisor virtualization platform. It describes two attacks:
1) A denial of service attack where a malicious domain can pad a large file to its kernel image, consuming significant system resources during booting and preventing other domains from accessing resources.
2) An attack where an insider with dom0 privileges can use the "dump-core" command to take a memory snapshot of a target domain, allowing extraction of plaintext passwords and sensitive data from the domain's memory.
The document analyzes these issues and argues that Xen's architecture, with the dom0 control domain having elevated privileges, is the root cause of vulnerabilities. It suggests the privileges of dom0 should be reduced to