1. SoK: Understanding the Prevailing Security Vulnerabilities in TrustZone-assisted TEE Systems
2. The bedrock structured programming system
3. Arm security technology-building a secure system using trustzone technology;arm;PRD-GENC-C ARM Ltd Apr (cit on p ) Tech Rep Tech Rep,2009
4. Se14: From general purpose to a proof of information flow enforcement;murray;IEEE S&P,2013
5. Ironclad apps: End-to-End security via automated Full-System verification;hawblitzel;Proc of USENIX OSDI,0