Notes

We discussed some of the attacks possible with naive use of VMFUNC (see here, near bottom).

We also discussed what we hope to do with VMFUNC. We talked about Network Function Virtualization (NFV). What are some scenarios where it's useful.