Virtualization platforms heavily rely on/frequently depend upon/commonly utilize system calls to bridge the gap/facilitate communication/establish a connection between guest operating systems and the host kernel. However, this/This presents a/Nevertheless, there is a potential security vulnerability/risk exposure/weakness point as malicious guests