Cisco Architecture for Lawful Intercept in IP Networks, RFC, vol.3924, 2004. ,
DOI : 10.17487/rfc3924
The Price of Safety: Evaluating IOMMU Performance, The Ottawa Linux Symposium, pp.9-20, 2007. ,
TRESOR-HUNT, Proceedings of the 28th Annual Computer Security Applications Conference on, ACSAC '12, pp.71-78 ,
DOI : 10.1145/2420950.2420961
Hard disk drive architecture, 1995. ,
On the difficulty of software-based attestation of embedded devices, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.400-409, 2009. ,
DOI : 10.1145/1653662.1653711
Exploiting Lawful Intercept to Wiretap the Internet, 2010. ,
When Firmware Modifications Attack: A Case Study of Embedded Exploitation, Network and Distributed System Security Symposium, p.2013 ,
Phrack 49 ,
Owned by an iPod: Firewire, Issues . PacSec, 1394. ,
Lessons from the Sony CD DRM episode [15] J. Heasman. Implementing and Detecting an ACPI BIOS Rootkit, USENIX Security Symposium16] J. Heasman. Implementing and Detecting a PCI Rootkit. Black Hat, pp.77-92, 2006. ,
Ensuring operating system kernel integrity with OSck, Conference on Architectural Support for Programming Languages and Operating Systems, pp.279-290, 2011. ,
DOI : 10.1145/2248487.1950398
Designing and Implementing Malicious Hardware, Workshop on Large-scale Exploits and Emergent Threats, 2008. ,
Secure USB Flash Drives, 2013. ,
Beyond Autorun: Exploiting vulnerabilities with removable storage. Black Hat URL https://media.blackhat.com/bh-dc-11/Larimer, 2011. ,
VIPER, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, pp.3-16, 2011. ,
DOI : 10.1145/2046707.2046711
Maxtor Basics Personal Storage 3200 virus, 2013. ,
TRESOR runs encryption securely outside RAM, USENIX Security Symposium, pp.17-17 ,
Copilot ? a Coprocessor-based Kernel Runtime Integrity Monitor, USENIX Security Symposium, 2004. ,
A chipset level network backdoor, Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, ASIACCS '09, pp.125-134, 2009. ,
DOI : 10.1145/1533057.1533076
Nonintrusive Remote Healing Using Backdoors In Workshop on Algorithms and Architectures for Self-Managing Systems, 2003. ,
Reflections on trusting trust, Communications of the ACM, vol.27, issue.8, pp.761-763, 1984. ,
DOI : 10.1145/358198.358210
Project Maux Mk.II, I 0wn the NIC, now I want a Shell, PacSec Conference, 2008. ,