1. Protecting cloud virtual machines from commodity hypervisor and host operating system exploits;li;Usenix Security,2019
2. vtz: Virtualizing ARM trustzone;hua;Usenix Security,2017
3. The protection of information in computer systems
4. Armv8 white paper,0
5. Arm trusted firmware,2021