D. Dagon, T. Martin, and T. Starner, Mobile Phones as Computing Devices: The Viruses are Coming!, IEEE Pervasive Computing, vol.3, issue.4, pp.11-15, 2004.
DOI : 10.1109/MPRV.2004.21

D. Lie, C. Thekkath, and M. Horowitz, Implementing an untrusted operating system on trusted hardware, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.178-192, 2003.

D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh et al., Architectural support for copy and tamper resistant software, ASPLOS-IX: Proceedings of the ninth international conference on Architectural support for programming languages and operating systems, pp.168-177, 2000.
DOI : 10.1145/356989.357005

G. , E. Suh, C. W. Donnell, I. Sachdev, and S. Devadas, Design and implementation of the aegis single-chip secure processor using physical random functions, ISCA '05: Proceedings of the 32nd Annual International Symposium on Computer Architecture, pp.25-36, 2005.

G. , E. Suh, D. Clarke, B. Gassend, M. Van-dijk et al., Aegis: architecture for tamper-evident and tamper-resistant processing, ICS '03: Proceedings of the 17th annual international conference on Supercomputing, pp.160-171, 2003.

G. , E. Suh, D. Clarke, B. Gassend, M. Van-dijk et al., Efficient memory integrity verification and encryption for secure processors, MICRO 36: Proceedings of the 36th annual IEEE/ACM International Symposium on Microarchitecture, p.339, 2003.

H. Krawczyk, M. Bellare, and R. Canetti, Hmac: Keyed-hashing for message authentification, 1997.
DOI : 10.17487/rfc2104

R. C. Merkle, Protocols for public key cryptography, IEEE Symposium on Security and Privacy, pp.122-134, 1980.

R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, 2001.

W. Burleson, G. Gogniat, and T. Wolf, Reconfigurable security support for embedded systems, HICSS '06: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06), pp.250-251, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00089406