1. The trustworthy computing security development lifecycle;Lipner,2004
2. Fending Off Future Attacks by Reducing Attack Surface;Howard,2003
3. Attack Surface: Mitigate Security Risks by Minimizing the Code You Expose to Untrusted Users;Howard,2004
4. Measuring a System’s Attack Surface;Manadhata,2004
5. Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability;Younis,2014