Building a trusted computing base
The Importance of Secure Hosts
(take car download example)