1. Control-flow integrity principles, implementations, and applications
2. Revisiting hardware-assisted page walks for virtualized systems
3. Harold Booth Doug Rike Gregory A Witte etal 2013. The national vulnerability database (nvd): Overview. ITL Bulletin National Institute of Standards and Technology Gaithersburg MD (2013). Harold Booth Doug Rike Gregory A Witte et al. 2013. The national vulnerability database (nvd): Overview. ITL Bulletin National Institute of Standards and Technology Gaithersburg MD (2013).
4. Brendan Cully , Geoffrey Lefebvre , Dutch Meyer , Mike Feeley , Norm Hutchinson , and Andrew Warfield . 2008 . Remus: High availability via asynchronous virtual machine replication . In Proceedings of the 5th USENIX symposium on networked systems design and implementation . San Francisco, 161--174. Brendan Cully, Geoffrey Lefebvre, Dutch Meyer, Mike Feeley, Norm Hutchinson, and Andrew Warfield. 2008. Remus: High availability via asynchronous virtual machine replication. In Proceedings of the 5th USENIX symposium on networked systems design and implementation. San Francisco, 161--174.