In which type of attack does an adversary leverage a position on a guest operating system to gain access to hardware resources assigned to other operating systems, which are running in the same hardware environment?
a. Buffer overflow
b. Directory traversal
c. VM escape
d. Cross-site scripting