1. LeVasseur J. , Uhlig V. , Stoess J. and Götz S. (2004) Unmodified Device Driver Reuse and Improved System Dependability Via Virtual Machines. Proc. 6th Conf. on Symposium on Operating Systems Design & Implementation, San Francisco, CA, USA, December 6–8, pp. 17–30. USENIX Association, Berkeley, CA, USA.
2. Barham P. , Dragovic B. , Fraser K. , Hand S. , Harris T. , Ho A. , Neugebauer R. , Pratt I. and Warfield A. (2003) Xen and the Art of Virtualization. Proc. 9th ACM Symposium on Operating Systems Principles, SOSP'03, Bolton Landing, NY, USA, October 19–22, pp. 164–177. ACM, New York, NY, USA.
3. Chen P.M. and Noble B.D. (2001) When Virtual is Better than Real. Proc. Eighth Workshop on Hot Topics in Operating Systems, Elmau/Oberbayern, Germany, May 20–23, pp. 133–138. IEEE Computer Society, Washington, DC, USA.
4. Fraser K. , Pratt I. , Warfield A. and Williamson M. (2004) Safe Hardware Access with the Xen Virtual Machine Monitor. 1st Workshop on Operating System and Architectural Support for the on Demand IT InfraStructure (OASIS), Boston, MA, USA, October 9–13, pp. 1–10. ACM, New York, NY, USA.
5. Tan L. , Chan E.M. , Farivar R. , Mallick N. , Carlyle J.C. , David F.M. and Campbell R.H. (2007) Ikernel: Isolating Buggy and Malicious Device Drivers using Hardware Virtualization Support. Proc. 3rd IEEE Int. Symposium on Dependable, Autonomic and Secure Computing, Columbia, MD, USA, September 25–26, pp. 134–144. IEEE Computer Society, Washington, DC, USA.