1. Azab, A.M., Ning, P., Sezer, E.C., Zhang, X.: Hima: a hypervisor-based integrity measurement agent. In: Computer Security Applications Conference, ACSAC 2009, Annual, pp. 461–470, December 2009
2. Berger, S., Cáceres, R., Goldman, K.A., Perez, R., Sailer, R., van Doorn, L.: vTPM: Virtualizing the trusted platform module. In: Proceedings of the 15th Conference on USENIX Security Symposium, USENIX-SS 2006, vol. 15. USENIX Association (2006)
3. Berger, S., Goldman, K.A., Pendarakis, D., Safford, D., Valdez, E., Zohar, M.: Scalable attestation: a step toward secure and trusted clouds. In: 2015 IEEE International Conference on Cloud Engineering (IC2E), pp. 185–194, March 2015
4. Celesti, A., Fazio, M., Villari, M., Puliafito, A., Mulfari, D.: Remote and deep attestations to mitigate threats in cloud mash-up services. In: 2013 World Congress on Computer and Information Technology (WCCIT), pp. 1–6, June 2013
5. Champagne, D., Lee, R.B.: Processor-based tailored attestation. Princeton University Department of Electrical Engineering, Technical Report (2010)