A. Apvrille, D. Gordon, S. Hallyn, M. Pourzandi, and V. Roy, DigSig: Run-time Authentication of Binaries at Kernel Level, 2004.

L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat, Practical Domain and Type Enforcement for UNIX, Proceedings 1995 IEEE Symposium on Security and Privacy, 1995.
DOI : 10.1109/SECPRI.1995.398923

K. Biba, Integrity Considerations for Secure Computer Systems, ESD-TR-76-372, MITRE, 1977.

F. Halim, R. Ramnath, Y. Sufatrio, R. H. Wu, and . Yap, A Lightweight Binary Authentication System for Windows, Joint iTrust and PST Conf, 2008.
DOI : 10.1007/978-0-387-09428-1_19

K. Kato and Y. Oyama, SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation, Intl. Symp. on Software Security, 2003.
DOI : 10.1007/3-540-36532-X_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.1523

Z. Liang, W. Sun, V. Venkatakrishnan, and R. Sekar, Alcatraz, ACM Transactions on Information and System Security, vol.12, issue.3, 2009.
DOI : 10.1145/1455526.1455527

S. Motiee, K. Hawkey, and K. Beznosov, Do Windows Users Follow the Principle of Least Privilege? Investigating User Account Control Practices, SOUPS, 2010.

Y. Wu and R. H. Yap, Towards a binary integrity system for windows, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, 2011.
DOI : 10.1145/1966913.1966987

G. Wurster and P. C. Oorschot, Self-Signed Executables: Restricting Replacement of Program Binaries by Malware, USENIX HotSec, 2007.