1. Afianian, A, et al. (2019) Malware dynamic analysis evasion techniques: A survey. ACM Comput Surv (CSUR) 52(6):1–28.
2. Algawi, A, Kiperberg M, Leon R, Resh A, Zaidenberg N (2019) Creating Modern Blue Pills and Red Pills In: ECCWS 2019 18th European Conference on Cyber Warfare and Security, 6.. Academic Conferences and publishing limited, UK. https://jyx.jyu.fi/bitstream/handle/123456789/67098/1/CreatingModernBluePillsandRedPills.pdf.
3. AMD (2010) AMD64 Architecture Programmer’s Manual Volume 2: System Programming. https://www.amd.com/system/files/TechDocs/24593.pdf.
4. ARM Ltd. (2013) ARM Architecture Reference Manual, ARMv8, for ARMv8-A architecture profile. https://developer.arm.com/documentation/ddi0487/latest.
5. Barham, P, Dragovic B, Fraser K, Hand S, Harris T, Ho A, Neugebauer R, Pratt I, Warfield A (2003) XEN and the art of virtualization In: Proceedings of the 19th ACM Symposium on Operating System Principles.. SOSSP, Bolton Landing.