1. ZA Al-Sharif, MI Al-Saleh, LM Alawneh, YI Jararweh, B Gupta, Live forensics of software attacks on cyber physical systems. Futur. Gener. Comput. Syst (2018).
https://doi.org/10.1016/j.future.2018.07.028
, visited on 02/Jun/2019.
2. I Anati, S Gueron, S Johnson, V Scarlata, in Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy. HASP ’13, 13. Innovative Technology for CPU Based Attestation and Sealing (ACMNew York, 2013), pp. 1–7.
3. S Arnautov, B Trach, F Gregor, T Knauth, A Martin, C Priebe, J Lind, D Muthukumaran, ML Stillwell, D Goltzsche, D Eyers, P Pietzuch, C Fetzer, in Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation. OSDI’16. SCONE: Secure Linux Containers with Intel SGX (USENIX AssociationBerkeley, CA, USA, 2016), pp. 689–703.
http://doi.acm.org/10.1145/3026877.3026930
, visited on 02/Jun/2019.
4. A Atamli-Reineh, A Martin, in Security and Privacy in Communication Networks, ed. by B Thuraisingham, X Wang, and V Yegneswaran. Securing Application with Software Partitioning: A Case Study Using SGX (Springer International PublishingCham, 2015), pp. 605–621.
5. P-L Aublin, F Kelbert, D O’Keeffe, D Muthukumaran, C Priebe, J Lind, R Krahn, C Fetzer, D Eyers, P Pietzuch, in Proceedings of the Thirteenth EuroSys Conference. EuroSys ’18. LibSEAL: Revealing Service Integrity Violations Using Trusted Execution (ACMNew York, 2018), pp. 24:1–24:15.
https://doi.org/10.1145/3190508.3190547
, visited on 02/Jun/2019.