Building a trusted computing base
Malicious Code