A promising countermeasure approach to this threat
consists in the Cloud system performing a service instance
integrity check prior to using a service instance
for incoming requests. This can e.g. be done by storing
a hash value on the original service instance’s image
file and comparing this value with the hash values of all
new service instance images. Thus, an attacker would
be required to trick that hash value comparison in order
to inject his malicious instances into the Cloud system