"Bypassing information leakage protection with trusted applications."

Jorge Blasco Alís et al. (2012)
a service of Schloss Dagstuhl - Leibniz Center for Informatics