“…On the one hand, the main shortcoming of existing methods is that they need to leverage dynamic application monitoring facilities inside the operating system (OS), use system/application instrumentation [13, 18] or alternatively use virtualisation [15, 19, 20] in order to obtain their required application traces. In other words, they need to trust the system software, which results in a large and complex trusted computing base (TCB).…”