Building a trusted computing base
Concurrency Risks