Matt Bishop. Computer Security. Addison-Wesley, 2017.
John Erickson. The Art of Exploitation 2nd Edition, No Starch Press, 2008.
Robert C. Seacord. Secure Coding in C and C++. 2nd Edition, Pearson Education, 2005.
A. Sotirov. Bypassing Browser Memory Protections. 2008.
T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. NDSS, 2003.
Adam Barth, Collin Jackson, and John C. Mitchell. Securing Browser Frame Communication. Usenix, 2008.
Adam Barth, Collin Jackson, Charles Reis, and the Google Chrome Team. The Security Architecture of the Chromium Browser. 2008.
Bortz et al. Origin Cookies: Session Integrity for Web Applications. 2011.
Enck, Ongtang, and McDaniel. Understanding Android Security. 2009.
Allan Tomlinson. Introduction to the TPM: Smart Cards, Tokens, Security and Applications. 2008.
Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding Applications from an Untrusted Cloud with Haven. OSDI 2014.