1. Averbuch A, Kiperberg M, Zaidenberg NJ (2013) Truly-Protect: an efficient VM-based software protection. IEEE Syst J 7(3):455–466
2. David A, Zaidenberg N (2014) Maintaining streaming video DRM. In: 2nd international conference on cloud security management (ICCSM 2014). Academic Conferences, pp 36–41
3. Kennell R, Jamieson LH (2003) Establishing the genuinity of remote computer systems. In: Proceedings of the 12th USENIX security symposium. USENIX Association, pp 295–310
4. Kennell R, Jamieson LH (2004) An analysis of proposed attacks against genuinity tests. CERIAS Tech Report, 2004–27, Purdue University, West Lafayette, IN
5. Khen E, Zaidenberg NJ, Averbuch A (2011) Using virtualization for online kernel profiling, code coverage and instrumentation. In: 2011 international symposium on performance evaluation of computer & telecommunication systems. IEEE, pp 104–110