1. Lacombe, E., Nicomette, V., Deswarte, Y.: Enforcing Kernel constraints by hardware-assisted virtualization. Journal of Computer Virology 7(1), 1–21 (2011)
2. Duflot, L., Levillain, O.: ACPI et routine de traitement de la SMI: des limites l’informatique de confiance. In: Symposium sur la Sécurité des Technologies de l’Information et des Communications (SSTIC) (June 2009)
3. Lone Sang, F., Lacombe, E., Nicomette, V., Deswarte, Y.: Exploiting an I/OMMU vulnerability. In: International Conference on Malicious and Unwanted Software (MALWARE 2010), Nancy, France, October 19-20, pp. 9–16 (2010)
4. Abrial, J.-R.: Extending B Without Changing it (for Developing Distributed Systems). In: 1st Conference on the B method, Putting into Practice Methods and Tools for Information System Design, pp. 169–190. Institut de Recherche en Informatique de Nantes, France (1996)
5. Jaeger, E., Hardin, T.: A few remarks about formal development of secure systems. In: 11th IEEE High Assurance Systems Engineering Symposium (HASE), pp. 165–174 (2008)