1. Bates, A., Tian, D. J., Butler, K. R., and Moyer, T. Trustworthy Whole-System Provenance for the Linux Kernel. In USENIX Security (2015).
2. Biba, K. J. Integrity Considerations for Secure Computer Systems. In Technical Report ESD-TR-76-372, USAF Electronic Systems Division, Hanscom Air Force Base, Bedford, Massachusetts (1977).
3. Brian Gorenc, J. S. Thinking outside the sandbox - Violating trust boundaries in uncommon ways. In BlackHat (2014).
4. Brumley, D., and Song, D. Privtrans: Automatically Partitioning Programs for Privilege Separation. In USENIX Security (2004).
5. BufferZone Security Ltd. BufferZone, http://bufferzonesecurity.com/.