1. Rutkowska, J.: Subverting vista kernel for fun and profit. In: Black Hat in Las Vegas (2006)
2. Lacombe, É., Raynal, F., Nicomette, V.: Rootkit modeling and experiments under Linux. J. Comput. Virol. 4(21), 137–157 (2008) http://www.ingentaconnect.com/content/klu/11416/2008/00000004/00000002/00000069
3. Intel: Intel trusted execution technology—measured launched environment developer’s guide (2008)
4. Intel: Intel 64 and IA-32 Architectures software developer’s manual, vol. 3A: System programming guide, Part 1 (2008)
5. Intel: Intel 64 and IA-32 Architectures software developer’s manual, vol. 3B: System programming guide, Part 2 (2008)