Building a trusted computing base
Portable Interceptor