1. Wang, Y.M., Beck, D., et al.: Detecting stealth software with strider ghostbuster. In: Proceedings of the International Conference on Dependable Systems and Networks (2005)
2. Communications in Computer and Information Science;J Joy,2011
3. Liu, Z.W., Feng, D.G.: TPM-based dynamic integrity measurement architecture. J. Electron. Inf. Technol. 32(4), 875–879 (2010)
4. Lecture Notes in Computer Science;S Bratus,2008
5. Petroni, Jr. N.L., Fraser, et al.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th Conference on USENIX Security Symposium (2004)