1. InvisiMem
2. ObfusMem
3. Andrew Baumann Marcus Peinado and Galen Hunt. 2015. Shielding Applications from an Untrusted Cloud with Haven. ACM Transactions on Computer Systems (TOCS)33 3 (2015) 8. 10.1145/2799647 Andrew Baumann Marcus Peinado and Galen Hunt. 2015. Shielding Applications from an Untrusted Cloud with Haven. ACM Transactions on Computer Systems (TOCS)33 3 (2015) 8. 10.1145/2799647
4. N. Chatterjee R. Balasubramonian M. Shevgoor S. Pugsley A. Udipi A. Shafiee K. Sudan M. Awasthi and Z. Chishti. 2012. USIMM: the Utah SImulated Memory Module. Technical Report. University of Utah. UUCS-12-002. N. Chatterjee R. Balasubramonian M. Shevgoor S. Pugsley A. Udipi A. Shafiee K. Sudan M. Awasthi and Z. Chishti. 2012. USIMM: the Utah SImulated Memory Module. Technical Report. University of Utah. UUCS-12-002.
5. Claire Cain Miller. {n. d.}. Revelations of N.S.A. Spying Cost U.S. TechCompanies. https://tinyurl.com/y9syuvwg. Claire Cain Miller. {n. d.}. Revelations of N.S.A. Spying Cost U.S. TechCompanies. https://tinyurl.com/y9syuvwg.