3Bratus S, DCunha N, Sparks E, et al. TOCTOU, traps, and trusted computing [M]// Trusted Computing-Challenges and Applications. Springer Berlin Heidelberg, 2008 : 14-32.
4Petroni N L, Hicks M. Automated detection of persistent kernel control-flow attacks[C]//Proc, of the 14th ACM Conference on Computer and Communications Security. New York: ACM Press, 2007 : 103-115.
5Baliga A, Ganapathy V, Iftode L. Detecting kernel-level rootkits using data structure invariants[J]. IEEE Transactions on De- pendable and Secure Computing, 2011,8 (5) : 670-684.