1. Bratus, S., D’Cunha, N., Sparks, E., Smith, S.: TOCTOU, Traps, and Trusted Computing. In: Proceedings of the TRUST 2008 Conference, Villach, Austria (March 2008)
2. Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: New Directions for Hardware-assisted Trusted Computing Policies (Position Paper). In: Gawrock, D., Reimer, H., Sadeghi, A.-R., Vishik, C. (eds.) Future of Trust in Computing, p. 30. Vieweg+Teubner Verlag, GWV Fachverlage GmbH, Wiesbaden (2009), ISBN 978-3-8348-0794-6
3. Bratus, S., Locasto, M.E., Ramaswamy, A., Smith, S.W.: Traps, events, emulation, and enforcement: managing the yin and yang of virtualization-based security. In: VMSec 2008: Proceedings of the 1st ACM workshop on Virtual machine security, pp. 49–58. ACM, New York (2008)
4. Levine, J.: Linkers & Loaders. Morgan Kaufmann/Academic (2000)
5. Last Stage of Delirium Research Group: Kernel Level Vulnerabilities: Behind the Scenes of the 5th Argus Hacking Challenge. Black Hat Briefings, Amsterdam (November 2001), http://www.blackhat.com/presentations/bh-europe-01/LSD/bh-europe-01-lsd.ppt