1. Shi, E., Perrig A., & Doorn, L.V. (2005). BIND: A fine-grained attestation service for secure distributed systems. Proceedings of the IEEE Symposium on Security and Privacy.
2. Rohit Sinha (Univ. of California, Berkeley); Sriram Rajamani (Microsoft Research); Sanjit Seshia (Univ. of California, Berkeley); Kapil Vaswani (Microsoft Research):Moat: Verifying confidentiality of enclave programs. Ccs 2017.
3. F-Secure (2015). F-Secure Blacklight.
http://www.f-secure.com/blacklight/blacklight.html
.
4. Sharif, M. I., Lee, W., Cui, W., & Lanzi, A. (2009). Secure in-VM Mon-itoring using hardware virtualization. Proceedings of CCS,
5. Xiong, X., Tian, D., Liu, P., & Perrig, A. (2011). Practical protection of kernel integrity for commodity OS from untrusted extensions. San Diego, California: NDSS.