-  Matt Bishop. Computer Security. Addison-Wesley, 2017. 
-  John Erickson. The Art of Exploitation 2nd Edition,  No Starch Press, 2008. 
-  Robert C. Seacord. Secure Coding in C and C++. 2nd Edition, Pearson Education, 2005. 
-  A. Sotirov. Bypassing Browser Memory Protections. 2008. 
-  T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. NDSS, 2003. 
-  Adam Barth, Collin Jackson, and John C. Mitchell. Securing Browser Frame Communication.  Usenix, 2008. 
-  Adam Barth, Collin Jackson, Charles Reis, and the Google Chrome Team. The Security Architecture of the Chromium Browser.  2008. 
-  Bortz et al. Origin Cookies: Session Integrity for Web Applications. 2011. 
-  Enck, Ongtang, and McDaniel. Understanding Android Security.  2009. 
-  Allan Tomlinson. Introduction to the TPM:  Smart Cards, Tokens, Security and Applications. 2008. 
-  Andrew Baumann, Marcus Peinado, and Galen Hunt. Shielding Applications from an Untrusted Cloud with Haven.  OSDI 2014.