1. Lipaev, V.V., Quality Control of Large Software Systems, Moscow: SINTEG, 2003 [in Russian].
2. Garfinkel, T., Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, Proc. of the Internet Society’s 2003 Symposium on Network and Distributed System Security, 2003, pp. 163–176.
3. Popek, G.J. and Goldberg, R.P., Formal Requirements for Virtualizable Third Generation Architectures, Commun. ACM, 1974, vol. 17, no. 7, pp. 412–421.
4. Kasperski, K., Hardware Virtualization Unleashed, InsidePro, 2007; http://www.insidepro.com/kk/159/159r.shtml
5. Dinaburg, A., Royal, P., Sharif, M., and Lee, W., Ether: Malware Analysis via Hardware Virtualization Extensions, Proc. of the 15th ACM Conf. on Computer and Communications Security, 2008, pp. 51–62.