Which attack surfaces, if any, does virtualization technology introduce?