1. BERGER, S., GOLDMAN, K.A., PEREZ, R., SAILER, R., and DOORN, L.V., 2006. vTPM: virtualizing the trusted platform module. In Conference on Usenix Security Symposium, 21.
2. STUMPF, F., BENZ, M., HERMANOWSKI, M., and ECKERT, C., 2007. An approach to a trustworthy system architecture using virtualization. In International Conference on Autonomic and Trusted Computing, 191--202.
3. HOEKSTRA, M., LAL, R., PAPPACHAN, P., PHEGADE, V., and CUVILLO, J.D., 2013. Using innovative instructions to create trustworthy software solutions. In International Workshop on Hardware and Architectural Support for Security and Privacy, 11.
4. ANATI, I., GUERON, S., JOHNSON, S., and SCARLATA, V., 2013. Innovative technology for CPU based attestation and sealing. In Proceedings of the 2nd international workshop on hardware and architectural support for security and privacy ACM New York, NY, USA.
5. MCKEEN, F., ALEXANDROVICH, I., BERENZON, A., ROZAS, C.V., SHAFI, H., SHANBHOGUE, V., and SAVAGAONKAR, U.R., 2013. Innovative instructions and software model for isolated execution. In International Workshop on Hardware and Architectural Support for Security and Privacy, 1--1.