1. Xin, Z., Chen, H.-Y., Han, H., Mao, B., Xie, L.: Kernel rootkit defense based on automatic data structure randomization. J. Softw. 37(5), 1100–1101 (2014)
2. Coverity Scan Open Source Report 2014. http://go.coverity.com/rs/157-LQW-289/images/2014-Coverity-Scan-Report.pdf. Accessed 20 Feb 2018
3. Qin, Y., Dai, H., Yan, Y.: Study on defects relate to device driver in monolithic kernel of operating system. Comput. Sci. 38(4), 182–184+220 (2011)
4. Chou, A., Yang, J., Chelf, B., Hallem, S., Engler, D.: An empirical study of operating systems errors. In: ACM SIGOPS Operating Systems Review, vol. 35, pp. 73–88. ACM (2001)
5. Shabtai, A., Fledel, Y., Kanonov, U.: Google Android: a comprehensive security assessment. IEEE Secur. Priv. Mag. 8(2), 35–44 (2010)