F. Baker, B. Foster, and C. Sharp, Cisco Architecture for Lawful Intercept in IP Networks, RFC, vol.3924, 2004.
DOI : 10.17487/rfc3924

M. Ben-yehuda, J. Xenidis, M. Ostrowski, K. Rister, A. Bruemmer et al., The Price of Safety: Evaluating IOMMU Performance, The Ottawa Linux Symposium, pp.9-20, 2007.

E. Blass and W. Robertson, TRESOR-HUNT, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.71-78
DOI : 10.1145/2420950.2420961

R. A. Caldeira, J. C. Fravel, R. G. Ramsdell, and R. N. Nolasco, Hard disk drive architecture, 1995.

C. Castelluccia, A. Francillon, D. Perito, and C. Soriente, On the difficulty of software-based attestation of embedded devices, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.400-409, 2009.
DOI : 10.1145/1653662.1653711

T. Cross, Exploiting Lawful Intercept to Wiretap the Internet, 2010.

A. Cui, M. Costello, and S. J. Stolfo, When Firmware Modifications Attack: A Case Study of Embedded Exploitation, Network and Distributed System Security Symposium, p.2013

. P. Daemon9 and . Loki, Phrack 49

M. Dornseif, Owned by an iPod: Firewire, Issues . PacSec, 1394.

J. A. Halderman and E. W. Felten, Lessons from the Sony CD DRM episode [15] J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit, USENIX Security Symposium16] J. Heasman. Implementing and Detecting a PCI Rootkit. Black Hat, pp.77-92, 2006.

O. S. Hofmann, A. M. Dunn, S. Kim, I. Roy, and E. Witchel, Ensuring operating system kernel integrity with OSck, Conference on Architectural Support for Programming Languages and Operating Systems, pp.279-290, 2011.
DOI : 10.1145/2248487.1950398

S. T. King, J. Tucek, A. Cozzie, C. Grier, W. Jiang et al., Designing and Implementing Malicious Hardware, Workshop on Large-scale Exploits and Emergent Threats, 2008.

. Kingston, Secure USB Flash Drives, 2013.

J. Larimer, Beyond Autorun: Exploiting vulnerabilities with removable storage. Black Hat URL https://media.blackhat.com/bh-dc-11/Larimer, 2011.

Y. Li, J. M. Mccune, and A. Perrig, VIPER, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.3-16, 2011.
DOI : 10.1145/2046707.2046711

. Maxtor, Maxtor Basics Personal Storage 3200 virus, 2013.

T. Müller, F. C. Freiling, and A. Dewald, TRESOR runs encryption securely outside RAM, USENIX Security Symposium, pp.17-17

N. L. Petroni-jr, T. Fraser, J. Molina, and W. A. Arbaugh, Copilot ? a Coprocessor-based Kernel Runtime Integrity Monitor, USENIX Security Symposium, 2004.

S. Sparks, S. Embleton, and C. C. Zou, A chipset level network backdoor, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.125-134, 2009.
DOI : 10.1145/1533057.1533076

F. Sultan and A. Bohra, Nonintrusive Remote Healing Using Backdoors In Workshop on Algorithms and Architectures for Self-Managing Systems, 2003.

K. Thompson, Reflections on trusting trust, Communications of the ACM, vol.27, issue.8, pp.761-763, 1984.
DOI : 10.1145/358198.358210

A. Triulzi, Project Maux Mk.II, I 0wn the NIC, now I want a Shell, PacSec Conference, 2008.