4Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia, Efficiently TrackingApplication Interactions Using Lightweight Virtualization, VMSec workshop of CCS'08.
5Xiaoqi Jia, Shengzhi Zhang, Jiwu Jing, Peng Liu , Using Virtual Machines to Do Cross- Layer Damage Assessment, VMSec workshop of CCS'08.
6lonut Constandache, Aydan Yumerefendi, Jeff Chase, Secure Control of Portable Images in a Virtual Computing Utility , VMSec workshop of CCS'08.
7Heidar Pirzadeh, Danny Dub 6 , VEP: a Virtual Machine for Extended Proof-Carrying Code, VMSec workshop of CCS'08.
8Jenni Susan Reuben, a survey on virtual machine security, TKK (Helsinki University of Technology) T-110.5290 Seminar on Network Security, 2007-10-11/12.