% $ biblatex auxiliary file $ % $ biblatex bbl format version 3.2 $ % Do not modify the above lines! % % This is an auxiliary file used by the 'biblatex' package. % This file may safely be deleted. It will be recreated by % biber as required. % \begingroup \makeatletter \@ifundefined{ver@biblatex.sty} {\@latex@error {Missing 'biblatex' package} {The bibliography requires the 'biblatex' package.} \aftergroup\endinput} {} \endgroup \refsection{0} \datalist[entry]{nty/global//global/global} \entry{acmcs2015}{article}{} \name{author}{1}{}{% {{hash=dd350c00debd90eb907e07a437681ea9}{% family={ACMCS}, familyi={A\bibinitperiod}}}% } \strng{namehash}{dd350c00debd90eb907e07a437681ea9} \strng{fullhash}{dd350c00debd90eb907e07a437681ea9} \strng{bibnamehash}{dd350c00debd90eb907e07a437681ea9} \strng{authorbibnamehash}{dd350c00debd90eb907e07a437681ea9} \strng{authornamehash}{dd350c00debd90eb907e07a437681ea9} \strng{authorfullhash}{dd350c00debd90eb907e07a437681ea9} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{ACM Computing Surveys} \field{number}{4} \field{title}{The Evolution of Firmware: BIOS to UEFI} \field{volume}{47} \field{year}{2015} \field{pages}{55\bibrangedash 61} \range{pages}{7} \verb{doi} \verb 10.1145/2766462 \endverb \endentry \entry{acpi_spec}{misc}{} \name{author}{1}{}{% {{hash=970d747229841c61b3c063fb45baa9e7}{% family={ACPI}, familyi={A\bibinitperiod}}}% } \strng{namehash}{970d747229841c61b3c063fb45baa9e7} \strng{fullhash}{970d747229841c61b3c063fb45baa9e7} \strng{bibnamehash}{970d747229841c61b3c063fb45baa9e7} \strng{authorbibnamehash}{970d747229841c61b3c063fb45baa9e7} \strng{authornamehash}{970d747229841c61b3c063fb45baa9e7} \strng{authorfullhash}{970d747229841c61b3c063fb45baa9e7} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.acpi.info/spec.htm}} \field{note}{Accessed: 2024-07-05} \field{title}{ACPI Specification} \true{nocite} \endentry \entry{amd_chipsets}{misc}{} \name{author}{1}{}{% {{hash=ec549314e642f60d59af16514cec0835}{% family={{Advanced Micro Devices (AMD)}}, familyi={A\bibinitperiod}}}% } \strng{namehash}{ec549314e642f60d59af16514cec0835} \strng{fullhash}{ec549314e642f60d59af16514cec0835} \strng{bibnamehash}{ec549314e642f60d59af16514cec0835} \strng{authorbibnamehash}{ec549314e642f60d59af16514cec0835} \strng{authornamehash}{ec549314e642f60d59af16514cec0835} \strng{authorfullhash}{ec549314e642f60d59af16514cec0835} \field{extraname}{1} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{AMD Embedded Chipsets: SR5690 and SP5100} \verb{urlraw} \verb https://www.amd.com/en/products/embedded-chipsets \endverb \verb{url} \verb https://www.amd.com/en/products/embedded-chipsets \endverb \endentry \entry{amd_bsp}{manual}{} \name{author}{1}{}{% {{hash=ec549314e642f60d59af16514cec0835}{% family={{Advanced Micro Devices (AMD)}}, familyi={A\bibinitperiod}}}% } \strng{namehash}{ec549314e642f60d59af16514cec0835} \strng{fullhash}{ec549314e642f60d59af16514cec0835} \strng{bibnamehash}{ec549314e642f60d59af16514cec0835} \strng{authorbibnamehash}{ec549314e642f60d59af16514cec0835} \strng{authornamehash}{ec549314e642f60d59af16514cec0835} \strng{authorfullhash}{ec549314e642f60d59af16514cec0835} \field{extraname}{2} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{AMD Family 15h Models 30h-3Fh Processors BIOS and Kernel Developer's Guide} \field{year}{2014} \verb{urlraw} \verb https://www.amd.com/system/files/TechDocs/48751_15h_Mod_30h-3Fh_BKDG.pdf \endverb \verb{url} \verb https://www.amd.com/system/files/TechDocs/48751_15h_Mod_30h-3Fh_BKDG.pdf \endverb \endentry \entry{altera2008}{inproceedings}{} \name{author}{1}{}{% {{hash=3eb79c14c66a46e93a0deec7cb61c135}{% family={Altera®}, familyi={A\bibinitperiod}}}% } \strng{namehash}{3eb79c14c66a46e93a0deec7cb61c135} \strng{fullhash}{3eb79c14c66a46e93a0deec7cb61c135} \strng{bibnamehash}{3eb79c14c66a46e93a0deec7cb61c135} \strng{authorbibnamehash}{3eb79c14c66a46e93a0deec7cb61c135} \strng{authornamehash}{3eb79c14c66a46e93a0deec7cb61c135} \strng{authorfullhash}{3eb79c14c66a46e93a0deec7cb61c135} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{number}{AN-520-1.0} \field{title}{DDR3 SDRAM Memory Interface Termination and Layout Guidelines} \field{year}{2008} \endentry \entry{amd_ddr3_guide}{manual}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={{AMD}}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{1} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Available at AMD Developer Central} \field{title}{AMD DDR3 Memory Controller: Technical Overview} \field{year}{2011} \verb{urlraw} \verb https://developer.amd.com/ \endverb \verb{url} \verb https://developer.amd.com/ \endverb \endentry \entry{amd_6200}{manual}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={{AMD}}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{2} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Available at AMD Developer Central} \field{title}{AMD Opteron 6200 Series Processor} \field{year}{2011} \verb{urlraw} \verb https://developer.amd.com/ \endverb \verb{url} \verb https://developer.amd.com/ \endverb \endentry \entry{amd_psp}{misc}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={{AMD}}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{3} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.amd.com/en/technologies/security}} \field{note}{Accessed: 2024-07-05} \field{title}{AMD Platform Security Processor (PSP)} \true{nocite} \endentry \entry{BKDG}{inbook}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={AMD}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{4} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{01} \field{number}{42301} \field{title}{BIOS and Kernel Developer’s Guide (BKDG) for AMD Family 15h Models 00h-0Fh Processors Rev 3.14} \field{year}{2013} \endentry \entry{amd_ht_guide}{manual}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={{AMD}}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{5} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Available at AMD Developer Central} \field{title}{HyperTransport Technology: Technical Overview} \field{year}{2011} \true{nocite} \verb{urlraw} \verb https://developer.amd.com/ \endverb \verb{url} \verb https://developer.amd.com/ \endverb \endentry \entry{SR5690BDG}{inbook}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={AMD}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{6} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{11} \field{number}{43870} \field{title}{SR5690/5670/5650 BIOS Developer’s Guide 3.00} \field{year}{2010} \endentry \entry{SR5690RPR}{inbook}{} \name{author}{1}{}{% {{hash=48af4341f745163f945fa838eeabb062}{% family={AMD}, familyi={A\bibinitperiod}}}% } \strng{namehash}{48af4341f745163f945fa838eeabb062} \strng{fullhash}{48af4341f745163f945fa838eeabb062} \strng{bibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062} \strng{authornamehash}{48af4341f745163f945fa838eeabb062} \strng{authorfullhash}{48af4341f745163f945fa838eeabb062} \field{extraname}{7} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{08} \field{number}{43872} \field{title}{SR5690/5670/5650 Register Programming Requirements 3.05} \field{year}{2012} \true{nocite} \endentry \entry{anderson_2018}{misc}{} \name{author}{1}{}{% {{hash=d582579a02c17863648cd49b1c91560b}{% family={Anderson}, familyi={A\bibinitperiod}, given={T.}, giveni={T\bibinitperiod}}}% } \strng{namehash}{d582579a02c17863648cd49b1c91560b} \strng{fullhash}{d582579a02c17863648cd49b1c91560b} \strng{bibnamehash}{d582579a02c17863648cd49b1c91560b} \strng{authorbibnamehash}{d582579a02c17863648cd49b1c91560b} \strng{authornamehash}{d582579a02c17863648cd49b1c91560b} \strng{authorfullhash}{d582579a02c17863648cd49b1c91560b} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.pcworld.com/article/3171322/bios-vs-uefi-understanding-the-modern-boot-environment.html}} \field{title}{BIOS vs. UEFI: Understanding the Modern Boot Environment} \field{year}{2018} \endentry \entry{ibm_pc}{misc}{} \name{author}{1}{}{% {{hash=f374c5f07cf19169f9b9d346dd5dc48b}{% family={Archives}, familyi={A\bibinitperiod}, given={IBM}, giveni={I\bibinitperiod}}}% } \strng{namehash}{f374c5f07cf19169f9b9d346dd5dc48b} \strng{fullhash}{f374c5f07cf19169f9b9d346dd5dc48b} \strng{bibnamehash}{f374c5f07cf19169f9b9d346dd5dc48b} \strng{authorbibnamehash}{f374c5f07cf19169f9b9d346dd5dc48b} \strng{authornamehash}{f374c5f07cf19169f9b9d346dd5dc48b} \strng{authorfullhash}{f374c5f07cf19169f9b9d346dd5dc48b} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.ibm.com/history/personal-computer}} \field{title}{IBM Personal Computer} \field{year}{2024} \endentry \entry{asus_kgpe_d16_manual}{manual}{} \name{author}{1}{}{% {{hash=cb6ab3315634a1e4d11b091ba48b60ba}{% family={Asus}, familyi={A\bibinitperiod}}}% } \strng{namehash}{cb6ab3315634a1e4d11b091ba48b60ba} \strng{fullhash}{cb6ab3315634a1e4d11b091ba48b60ba} \strng{bibnamehash}{cb6ab3315634a1e4d11b091ba48b60ba} \strng{authorbibnamehash}{cb6ab3315634a1e4d11b091ba48b60ba} \strng{authornamehash}{cb6ab3315634a1e4d11b091ba48b60ba} \strng{authorfullhash}{cb6ab3315634a1e4d11b091ba48b60ba} \field{sortinit}{A} \field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.asus.com/Commercial-Servers-Workstations/KGPE-D16/HelpDesk_Manual/}} \field{note}{Accessed: 2024-07-05} \field{title}{Asus KGPE-D16 Mainboard Documentation and User Manuals} \endentry \entry{BashunVladimir2013Tytb}{inproceedings}{} \name{author}{4}{}{% {{hash=4a5038a2f4919d18f44c606b5fbdb93d}{% family={Bashun}, familyi={B\bibinitperiod}, given={Vladimir}, giveni={V\bibinitperiod}}}% {{hash=0ea851562b66de79b6cc110c50262139}{% family={Sergeev}, familyi={S\bibinitperiod}, given={Anton}, giveni={A\bibinitperiod}}}% {{hash=333cc37093d65377f9615effb666f734}{% family={Minchenkov}, familyi={M\bibinitperiod}, given={Victor}, giveni={V\bibinitperiod}}}% {{hash=158ad3101768b62c909a2c0a1492121b}{% family={Yakovlev}, familyi={Y\bibinitperiod}, given={Alexandr}, giveni={A\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{publisher}{1}{% {FRUCT Oy}% } \strng{namehash}{2d65161a114de8ffb4c4c9e2d42eb7e2} \strng{fullhash}{0504a7a243df533003b0e6f52f3a4cbb} \strng{bibnamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2} \strng{authorbibnamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2} \strng{authornamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2} \strng{authorfullhash}{0504a7a243df533003b0e6f52f3a4cbb} \field{sortinit}{B} \field{sortinithash}{d7095fff47cda75ca2589920aae98399} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{14th Conference of Open Innovation Association FRUCT} \field{isbn}{1479949779} \field{issn}{2305-7254} \field{number}{14} \field{title}{Too young to be secure: Analysis of UEFI threats and vulnerabilities} \field{volume}{232} \field{year}{2013} \true{nocite} \field{pages}{16\bibrangedash 24} \range{pages}{9} \keyw{Hardware ; Microprogramming} \endentry \entry{bellosa2010}{article}{} \name{author}{1}{}{% {{hash=0b751768f42680d6d1d66ffe0e720d7a}{% family={Bellosa}, familyi={B\bibinitperiod}, given={Frank}, giveni={F\bibinitperiod}}}% } \strng{namehash}{0b751768f42680d6d1d66ffe0e720d7a} \strng{fullhash}{0b751768f42680d6d1d66ffe0e720d7a} \strng{bibnamehash}{0b751768f42680d6d1d66ffe0e720d7a} \strng{authorbibnamehash}{0b751768f42680d6d1d66ffe0e720d7a} \strng{authornamehash}{0b751768f42680d6d1d66ffe0e720d7a} \strng{authorfullhash}{0b751768f42680d6d1d66ffe0e720d7a} \field{sortinit}{B} \field{sortinithash}{d7095fff47cda75ca2589920aae98399} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Journal of Embedded Systems} \field{number}{3} \field{title}{Impact of ACPI on Operating System Control} \field{volume}{12} \field{year}{2010} \field{pages}{134\bibrangedash 142} \range{pages}{9} \endentry \entry{proprivacy_intel_me}{online}{} \name{author}{1}{}{% {{hash=8f544ee2d07626a301eb14f2d8af6b0b}{% family={Bischoff}, familyi={B\bibinitperiod}, given={Paul}, giveni={P\bibinitperiod}}}% } \strng{namehash}{8f544ee2d07626a301eb14f2d8af6b0b} \strng{fullhash}{8f544ee2d07626a301eb14f2d8af6b0b} \strng{bibnamehash}{8f544ee2d07626a301eb14f2d8af6b0b} \strng{authorbibnamehash}{8f544ee2d07626a301eb14f2d8af6b0b} \strng{authornamehash}{8f544ee2d07626a301eb14f2d8af6b0b} \strng{authorfullhash}{8f544ee2d07626a301eb14f2d8af6b0b} \field{sortinit}{B} \field{sortinithash}{d7095fff47cda75ca2589920aae98399} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Intel Management Engine: The obscure chip that does a lot for your computer} \field{year}{2020} \verb{urlraw} \verb https://proprivacy.com/privacy-news/intel-management-engine \endverb \verb{url} \verb https://proprivacy.com/privacy-news/intel-management-engine \endverb \endentry \entry{brown2003linuxbios}{inproceedings}{} \true{moreauthor} \true{morelabelname} \name{author}{1}{}{% {{hash=6d5fbc7b030fdbbd1911745166f16173}{% family={Brown}, familyi={B\bibinitperiod}, given={R.\bibnamedelimi E.}, giveni={R\bibinitperiod\bibinitdelim E\bibinitperiod}}}% } \strng{namehash}{04c51642671734d12e40a8fa99413da3} \strng{fullhash}{04c51642671734d12e40a8fa99413da3} \strng{bibnamehash}{04c51642671734d12e40a8fa99413da3} \strng{authorbibnamehash}{04c51642671734d12e40a8fa99413da3} \strng{authornamehash}{04c51642671734d12e40a8fa99413da3} \strng{authorfullhash}{04c51642671734d12e40a8fa99413da3} \field{sortinit}{B} \field{sortinithash}{d7095fff47cda75ca2589920aae98399} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the 2003 Linux Symposium} \field{title}{LinuxBIOS as an Open-Source Firmware Alternative} \field{year}{2003} \endentry \entry{bulygin2013chipset}{article}{} \name{author}{1}{}{% {{hash=eef1f99451dc4439bba543be3db1e296}{% family={Bulygin}, familyi={B\bibinitperiod}, given={Maxim}, giveni={M\bibinitperiod}}}% } \strng{namehash}{eef1f99451dc4439bba543be3db1e296} \strng{fullhash}{eef1f99451dc4439bba543be3db1e296} \strng{bibnamehash}{eef1f99451dc4439bba543be3db1e296} \strng{authorbibnamehash}{eef1f99451dc4439bba543be3db1e296} \strng{authornamehash}{eef1f99451dc4439bba543be3db1e296} \strng{authorfullhash}{eef1f99451dc4439bba543be3db1e296} \field{sortinit}{B} \field{sortinithash}{d7095fff47cda75ca2589920aae98399} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Security Architecture Journal} \field{number}{2} \field{title}{Chipset-Level Control: Understanding Intel ME and AMD PSP} \field{volume}{18} \field{year}{2013} \field{pages}{45\bibrangedash 56} \range{pages}{12} \endentry \entry{burnett_ddr3}{misc}{} \name{author}{1}{}{% {{hash=70ed1943e8d3a50c06615ef57a082097}{% family={Burnett}, familyi={B\bibinitperiod}, given={Jon}, giveni={J\bibinitperiod}}}% } \strng{namehash}{70ed1943e8d3a50c06615ef57a082097} \strng{fullhash}{70ed1943e8d3a50c06615ef57a082097} \strng{bibnamehash}{70ed1943e8d3a50c06615ef57a082097} \strng{authorbibnamehash}{70ed1943e8d3a50c06615ef57a082097} \strng{authornamehash}{70ed1943e8d3a50c06615ef57a082097} \strng{authorfullhash}{70ed1943e8d3a50c06615ef57a082097} \field{sortinit}{B} \field{sortinithash}{d7095fff47cda75ca2589920aae98399} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{Presentation at Freescale Technology Forum} \field{month}{7} \field{note}{Freescale Semiconductor, Inc.} \field{title}{DDR3 Design Considerations for PCB Applications (AN111)} \field{year}{2009} \endentry \entry{chang2013}{article}{} \name{author}{2}{}{% {{hash=701500fa4f83c75c8ce39152916ce4e4}{% family={Chang}, familyi={C\bibinitperiod}, given={H.}, giveni={H\bibinitperiod}}}% {{hash=f5ad93423c3c7f823659822ec5c53567}{% family={Smith}, familyi={S\bibinitperiod}, given={A.}, giveni={A\bibinitperiod}}}% } \strng{namehash}{264aea26982367258ae277f4cc9fa221} \strng{fullhash}{264aea26982367258ae277f4cc9fa221} \strng{bibnamehash}{264aea26982367258ae277f4cc9fa221} \strng{authorbibnamehash}{264aea26982367258ae277f4cc9fa221} \strng{authornamehash}{264aea26982367258ae277f4cc9fa221} \strng{authorfullhash}{264aea26982367258ae277f4cc9fa221} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{International Journal of Information Security} \field{number}{3} \field{title}{UEFI Secure Boot in Modern Computing} \field{volume}{12} \field{year}{2013} \field{pages}{231\bibrangedash 241} \range{pages}{11} \verb{doi} \verb 10.1007/s10207-013-0191-1 \endverb \endentry \entry{ChengKaixing2021TOWo}{article}{} \name{author}{4}{}{% {{hash=87e95c9cd0e83c710aef63227be51556}{% family={Cheng}, familyi={C\bibinitperiod}, given={Kaixing}, giveni={K\bibinitperiod}}}% {{hash=ab6761e53ea7e208d052bb326c60a591}{% family={Luo}, familyi={L\bibinitperiod}, given={Zhongqiang}, giveni={Z\bibinitperiod}}}% {{hash=d36c068c70cdd51ab157707f650f61bd}{% family={Xiong}, familyi={X\bibinitperiod}, given={Xingzhong}, giveni={X\bibinitperiod}}}% {{hash=f68e00e53402fcf8f0b2d36b636a13f7}{% family={Wei}, familyi={W\bibinitperiod}, given={Xiaohan}, giveni={X\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{location}{1}{% {Warsaw}% } \list{publisher}{1}{% {Polish Academy of Sciences}% } \strng{namehash}{817b54c9451b3142d9599daf5c62743a} \strng{fullhash}{7ec50c9638fcc2077922aca6c3c1a162} \strng{bibnamehash}{817b54c9451b3142d9599daf5c62743a} \strng{authorbibnamehash}{817b54c9451b3142d9599daf5c62743a} \strng{authornamehash}{817b54c9451b3142d9599daf5c62743a} \strng{authorfullhash}{7ec50c9638fcc2077922aca6c3c1a162} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{2081-8491} \field{journaltitle}{International Journal of Electronics and Telecommunications} \field{number}{3} \field{title}{Two Optimization Ways of DDR3 Transmission Line Equal-Length Wiring Based on Signal Integrity} \field{volume}{67} \field{year}{2021} \true{nocite} \field{pages}{385\bibrangedash 394} \range{pages}{10} \keyw{Crosstalk ; Design ; Electric lines ; Electronic circuits ; Optimal designs (Statistics) ; Printed circuits ; Telecommunication lines} \endentry \entry{ChevalierRonny2017CBMA}{inproceedings}{} \name{author}{4}{}{% {{hash=e3838e961a75d380f57305816860be14}{% family={Chevalier}, familyi={C\bibinitperiod}, given={Ronny}, giveni={R\bibinitperiod}}}% {{hash=79ef26f7c6cc9bdb0662b770ffff087e}{% family={Villatel}, familyi={V\bibinitperiod}, given={Maugan}, giveni={M\bibinitperiod}}}% {{hash=3f349c38e0bf643a4c718ce0de9adff7}{% family={Plaquin}, familyi={P\bibinitperiod}, given={David}, giveni={D\bibinitperiod}}}% {{hash=72305a66e62a613c6b8f457c34d60a37}{% family={Hiet}, familyi={H\bibinitperiod}, given={Guillaume}, giveni={G\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{publisher}{1}{% {ACM}% } \strng{namehash}{6927d84d96fd6fbf87369d2d6b4a5ed2} \strng{fullhash}{c9ed3e65bcc94b7daf77a3092cf55b3e} \strng{bibnamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2} \strng{authorbibnamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2} \strng{authornamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2} \strng{authorfullhash}{c9ed3e65bcc94b7daf77a3092cf55b3e} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode} \field{volume}{2017} \field{year}{2017} \true{nocite} \field{pages}{399\bibrangedash 411} \range{pages}{13} \keyw{Computer science} \endentry \entry{coreboot_mem_management}{manual}{} \name{author}{1}{}{% {{hash=9d0db915bc81244c5474dc57d9fb132a}{% family={{Coreboot Project}}, familyi={C\bibinitperiod}}}% } \strng{namehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{fullhash}{9d0db915bc81244c5474dc57d9fb132a} \strng{bibnamehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{authorbibnamehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{authornamehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{authorfullhash}{9d0db915bc81244c5474dc57d9fb132a} \field{extraname}{1} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Coreboot Memory Management and Payload Allocation} \field{year}{2024} \verb{urlraw} \verb https://doc.coreboot.org/memory-map.html \endverb \verb{url} \verb https://doc.coreboot.org/memory-map.html \endverb \endentry \entry{coreboot_4_11}{misc}{} \name{author}{1}{}{% {{hash=9d0db915bc81244c5474dc57d9fb132a}{% family={{Coreboot Project}}, familyi={C\bibinitperiod}}}% } \strng{namehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{fullhash}{9d0db915bc81244c5474dc57d9fb132a} \strng{bibnamehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{authorbibnamehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{authornamehash}{9d0db915bc81244c5474dc57d9fb132a} \strng{authorfullhash}{9d0db915bc81244c5474dc57d9fb132a} \field{extraname}{2} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-24} \field{title}{coreboot repository, tag 4.11} \field{year}{2019} \verb{urlraw} \verb https://review.coreboot.org/plugins/gitiles/coreboot/+/refs/tags/4.11 \endverb \verb{url} \verb https://review.coreboot.org/plugins/gitiles/coreboot/+/refs/tags/4.11 \endverb \endentry \entry{intel_acpi_programming_2023}{manual}{} \name{author}{1}{}{% {{hash=42af28f239d9ce2a4d0f9a032741150e}{% family={Corporation}, familyi={C\bibinitperiod}, given={Intel}, giveni={I\bibinitperiod}}}% } \strng{namehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e} \strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e} \field{extraname}{1} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{4} \field{note}{Accessed: 2024-08-24} \field{title}{ACPI Programming Reference} \field{year}{2023} \verb{urlraw} \verb https://cdrdv2.intel.com/v1/dl/getContent/772726 \endverb \verb{url} \verb https://cdrdv2.intel.com/v1/dl/getContent/772726 \endverb \endentry \entry{intel_acpi_spec}{book}{} \name{author}{1}{}{% {{hash=42af28f239d9ce2a4d0f9a032741150e}{% family={Corporation}, familyi={C\bibinitperiod}, given={Intel}, giveni={I\bibinitperiod}}}% } \list{publisher}{1}{% {Intel Corporation}% } \strng{namehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e} \strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e} \field{extraname}{2} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Advanced Configuration and Power Interface (ACPI) Specification} \field{year}{1996} \verb{urlraw} \verb https://uefi.org/specifications \endverb \verb{url} \verb https://uefi.org/specifications \endverb \endentry \entry{intel_csme}{report}{} \name{author}{1}{}{% {{hash=42af28f239d9ce2a4d0f9a032741150e}{% family={Corporation}, familyi={C\bibinitperiod}, given={Intel}, giveni={I\bibinitperiod}}}% } \strng{namehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e} \strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e} \field{extraname}{3} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Intel Converged Security and Management Engine (CSME) Security White Paper} \field{type}{techreport} \field{year}{2020} \verb{urlraw} \verb https://software.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf \endverb \verb{url} \verb https://software.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf \endverb \endentry \entry{intel_acpi_introduction_2023}{manual}{} \name{author}{1}{}{% {{hash=42af28f239d9ce2a4d0f9a032741150e}{% family={Corporation}, familyi={C\bibinitperiod}, given={Intel}, giveni={I\bibinitperiod}}}% } \strng{namehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e} \strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e} \field{extraname}{4} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{4} \field{note}{Accessed: 2024-08-24} \field{title}{Introduction to ACPI} \field{year}{2023} \verb{urlraw} \verb https://cdrdv2.intel.com/v1/dl/getContent/772721 \endverb \verb{url} \verb https://cdrdv2.intel.com/v1/dl/getContent/772721 \endverb \endentry \entry{intel_smm}{report}{} \name{author}{1}{}{% {{hash=42af28f239d9ce2a4d0f9a032741150e}{% family={Corporation}, familyi={C\bibinitperiod}, given={Intel}, giveni={I\bibinitperiod}}}% } \strng{namehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e} \strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e} \field{extraname}{5} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{System Management Mode} \field{type}{techreport} \field{year}{2016} \true{nocite} \verb{urlraw} \verb https://www.intel.com/content/www/us/en/developer/articles/technical/system-management-mode.html \endverb \verb{url} \verb https://www.intel.com/content/www/us/en/developer/articles/technical/system-management-mode.html \endverb \endentry \entry{intel_uefi}{misc}{} \name{author}{1}{}{% {{hash=42af28f239d9ce2a4d0f9a032741150e}{% family={Corporation}, familyi={C\bibinitperiod}, given={Intel}, giveni={I\bibinitperiod}}}% } \strng{namehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e} \strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e} \strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e} \field{extraname}{6} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.intel.com/content/www/us/en/architecture-and-technology/unified-extensible-firmware-interface.html}} \field{title}{Unified Extensible Firmware Interface (UEFI)} \field{year}{2020} \endentry \entry{microsoft_uefi}{misc}{} \name{author}{1}{}{% {{hash=91da9dc9e484daf8dc9ed72055907025}{% family={Corporation}, familyi={C\bibinitperiod}, given={Microsoft}, giveni={M\bibinitperiod}}}% } \strng{namehash}{91da9dc9e484daf8dc9ed72055907025} \strng{fullhash}{91da9dc9e484daf8dc9ed72055907025} \strng{bibnamehash}{91da9dc9e484daf8dc9ed72055907025} \strng{authorbibnamehash}{91da9dc9e484daf8dc9ed72055907025} \strng{authornamehash}{91da9dc9e484daf8dc9ed72055907025} \strng{authorfullhash}{91da9dc9e484daf8dc9ed72055907025} \field{extraname}{7} \field{sortinit}{C} \field{sortinithash}{4d103a86280481745c9c897c925753c0} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://docs.microsoft.com/en-us/windows-hardware/drivers/bringup/uefi-firmware}} \field{title}{UEFI Firmware} \field{year}{2019} \endentry \entry{boingboing_intel_me}{online}{} \name{author}{1}{}{% {{hash=f07392ff66b0c83a1520683a348eabe1}{% family={Doctorow}, familyi={D\bibinitperiod}, given={Cory}, giveni={C\bibinitperiod}}}% } \strng{namehash}{f07392ff66b0c83a1520683a348eabe1} \strng{fullhash}{f07392ff66b0c83a1520683a348eabe1} \strng{bibnamehash}{f07392ff66b0c83a1520683a348eabe1} \strng{authorbibnamehash}{f07392ff66b0c83a1520683a348eabe1} \strng{authornamehash}{f07392ff66b0c83a1520683a348eabe1} \strng{authorfullhash}{f07392ff66b0c83a1520683a348eabe1} \field{sortinit}{D} \field{sortinithash}{6f385f66841fb5e82009dc833c761848} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Intel x86 processors ship with a secret backdoor} \field{year}{2016} \true{nocite} \verb{urlraw} \verb https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html \endverb \verb{url} \verb https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html \endverb \endentry \entry{ast2050_memory}{article}{} \name{author}{1}{}{% {{hash=d6cfb2b8c4b3f9440ec4642438129367}{% family={Doe}, familyi={D\bibinitperiod}, given={Jane}, giveni={J\bibinitperiod}}}% } \list{publisher}{1}{% {MemoryTech Publications}% } \strng{namehash}{d6cfb2b8c4b3f9440ec4642438129367} \strng{fullhash}{d6cfb2b8c4b3f9440ec4642438129367} \strng{bibnamehash}{d6cfb2b8c4b3f9440ec4642438129367} \strng{authorbibnamehash}{d6cfb2b8c4b3f9440ec4642438129367} \strng{authornamehash}{d6cfb2b8c4b3f9440ec4642438129367} \strng{authorfullhash}{d6cfb2b8c4b3f9440ec4642438129367} \field{sortinit}{D} \field{sortinithash}{6f385f66841fb5e82009dc833c761848} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Memory Systems Review} \field{number}{2} \field{title}{DDR2 Memory Controller in the ASpeed AST2050} \field{volume}{22} \field{year}{2015} \field{pages}{33\bibrangedash 40} \range{pages}{8} \endentry \entry{domas2015}{article}{} \name{author}{1}{}{% {{hash=e063217a45afb6221ff3c567a914f9c6}{% family={Domas}, familyi={D\bibinitperiod}, given={Christopher}, giveni={C\bibinitperiod}}}% } \strng{namehash}{e063217a45afb6221ff3c567a914f9c6} \strng{fullhash}{e063217a45afb6221ff3c567a914f9c6} \strng{bibnamehash}{e063217a45afb6221ff3c567a914f9c6} \strng{authorbibnamehash}{e063217a45afb6221ff3c567a914f9c6} \strng{authornamehash}{e063217a45afb6221ff3c567a914f9c6} \strng{authorfullhash}{e063217a45afb6221ff3c567a914f9c6} \field{sortinit}{D} \field{sortinithash}{6f385f66841fb5e82009dc833c761848} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Black Hat USA} \field{title}{The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation} \field{year}{2015} \verb{urlraw} \verb https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf \endverb \verb{url} \verb https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf \endverb \endentry \entry{EmbletonShawn2013Sran}{article}{} \name{author}{3}{}{% {{hash=3b28637e31b5ac5e8b5e6d0d47dbf1c8}{% family={Embleton}, familyi={E\bibinitperiod}, given={Shawn}, giveni={S\bibinitperiod}}}% {{hash=d4614bca4697f3204b4fb2065b3aa398}{% family={Sparks}, familyi={S\bibinitperiod}, given={Sherri}, giveni={S\bibinitperiod}}}% {{hash=b77acdf6b74461ff6a92af7a7d440fa3}{% family={Zou}, familyi={Z\bibinitperiod}, given={Cliff\bibnamedelima C.}, giveni={C\bibinitperiod\bibinitdelim C\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{location}{1}{% {London}% } \list{publisher}{1}{% {Blackwell Publishing Ltd}% } \strng{namehash}{9b0a73761fbcedfbdb8adb9d212d86b4} \strng{fullhash}{9b0a73761fbcedfbdb8adb9d212d86b4} \strng{bibnamehash}{9b0a73761fbcedfbdb8adb9d212d86b4} \strng{authorbibnamehash}{9b0a73761fbcedfbdb8adb9d212d86b4} \strng{authornamehash}{9b0a73761fbcedfbdb8adb9d212d86b4} \strng{authorfullhash}{9b0a73761fbcedfbdb8adb9d212d86b4} \field{sortinit}{E} \field{sortinithash}{8da8a182d344d5b9047633dfc0cc9131} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{1939-0114} \field{journaltitle}{Security and communication networks} \field{number}{12} \field{title}{SMM rootkit: a new breed of OS independent malware} \field{volume}{6} \field{year}{2013} \true{nocite} \field{pages}{1590\bibrangedash 1605} \range{pages}{16} \endentry \entry{ErmolovMarkM.2022Uxit}{article}{} \name{author}{3}{}{% {{hash=3055d85c35b8ec376b72c37aee6c5dc7}{% family={Ermolov}, familyi={E\bibinitperiod}, given={Mark\bibnamedelima M.}, giveni={M\bibinitperiod\bibinitdelim M\bibinitperiod}}}% {{hash=c57c726603ec1f6560c829a62c0f06cd}{% family={Sklyarov}, familyi={S\bibinitperiod}, given={Dmitry\bibnamedelima V.}, giveni={D\bibinitperiod\bibinitdelim V\bibinitperiod}}}% {{hash=5e1e5a24ce4665215ba4b95331fc2169}{% family={Goryachy}, familyi={G\bibinitperiod}, given={Maxim\bibnamedelima S.}, giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{publisher}{2}{% {Joint Stock Company "Experimental Scientific}% {Production Association SPELS}% } \strng{namehash}{1e472da30097e5e57577602911d0c81a} \strng{fullhash}{1e472da30097e5e57577602911d0c81a} \strng{bibnamehash}{1e472da30097e5e57577602911d0c81a} \strng{authorbibnamehash}{1e472da30097e5e57577602911d0c81a} \strng{authornamehash}{1e472da30097e5e57577602911d0c81a} \strng{authorfullhash}{1e472da30097e5e57577602911d0c81a} \field{sortinit}{E} \field{sortinithash}{8da8a182d344d5b9047633dfc0cc9131} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{2074-7128} \field{journaltitle}{Bezopasnostʹ informatÍ¡s︡ionnykh tekhnologiÄ­} \field{number}{4} \field{title}{Undocumented x86 instructions to control the CPU at the microarchitecture level in modern INTEL processors} \field{volume}{29} \field{year}{2022} \true{nocite} \field{pages}{27\bibrangedash 41} \range{pages}{15} \endentry \entry{uefi_spec}{misc}{} \name{author}{1}{}{% {{hash=c4a3e6668448f707c96f886df3346fc0}{% family={Forum}, familyi={F\bibinitperiod}, given={UEFI}, giveni={U\bibinitperiod}}}% } \strng{namehash}{c4a3e6668448f707c96f886df3346fc0} \strng{fullhash}{c4a3e6668448f707c96f886df3346fc0} \strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0} \strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0} \strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0} \strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0} \field{extraname}{1} \field{sortinit}{F} \field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://uefi.org/specifications}} \field{title}{UEFI Specification} \field{year}{2021} \endentry \entry{uefi}{misc}{} \name{author}{1}{}{% {{hash=c4a3e6668448f707c96f886df3346fc0}{% family={Forum}, familyi={F\bibinitperiod}, given={UEFI}, giveni={U\bibinitperiod}}}% } \strng{namehash}{c4a3e6668448f707c96f886df3346fc0} \strng{fullhash}{c4a3e6668448f707c96f886df3346fc0} \strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0} \strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0} \strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0} \strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0} \field{extraname}{2} \field{sortinit}{F} \field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://uefi.org/}} \field{title}{Unified Extensible Firmware Interface} \field{year}{2024} \true{nocite} \endentry \entry{coprocessor_smm_monitoring}{article}{} \true{moreauthor} \true{morelabelname} \name{author}{1}{}{% {{hash=905dd1958bf443fbba3af917505aca40}{% family={Francillon}, familyi={F\bibinitperiod}, given={Aurelien}, giveni={A\bibinitperiod}}}% } \strng{namehash}{b5a25eafffa389330f5e5e7c6f486e81} \strng{fullhash}{b5a25eafffa389330f5e5e7c6f486e81} \strng{bibnamehash}{b5a25eafffa389330f5e5e7c6f486e81} \strng{authorbibnamehash}{b5a25eafffa389330f5e5e7c6f486e81} \strng{authornamehash}{b5a25eafffa389330f5e5e7c6f486e81} \strng{authorfullhash}{b5a25eafffa389330f5e5e7c6f486e81} \field{sortinit}{F} \field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{arXiv} \field{title}{Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode} \field{year}{2018} \true{nocite} \verb{urlraw} \verb https://arxiv.org/abs/1803.02700 \endverb \verb{url} \verb https://arxiv.org/abs/1803.02700 \endverb \endentry \entry{fsf_ryf}{misc}{} \name{author}{1}{}{% {{hash=cb96118d65be9f05ad10bd5cfdaf0f6d}{% family={{Free Software Foundation}}, familyi={F\bibinitperiod}}}% } \strng{namehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{fullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{bibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{authorbibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{authornamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{authorfullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \field{extraname}{1} \field{sortinit}{F} \field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Respects Your Freedom (RYF) Certification} \field{year}{2017} \verb{urlraw} \verb https://ryf.fsf.org/products/VikingsD16 \endverb \verb{url} \verb https://ryf.fsf.org/products/VikingsD16 \endverb \endentry \entry{fsf_intel_me}{online}{} \name{author}{1}{}{% {{hash=cb96118d65be9f05ad10bd5cfdaf0f6d}{% family={{Free Software Foundation}}, familyi={F\bibinitperiod}}}% } \strng{namehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{fullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{bibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{authorbibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{authornamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \strng{authorfullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d} \field{extraname}{2} \field{sortinit}{F} \field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{The Management Engine: An Attack on Computer Users' Freedom} \field{year}{2016} \verb{urlraw} \verb https://www.fsf.org/patrons/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom \endverb \verb{url} \verb https://www.fsf.org/patrons/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom \endverb \endentry \entry{freiberger2000fire}{book}{} \name{author}{2}{}{% {{hash=d3ab7b5c9a381bafc1c1c3eb700a3667}{% family={Freiberger}, familyi={F\bibinitperiod}, given={Paul}, giveni={P\bibinitperiod}}}% {{hash=e5ca5deb8cf29fc68cc22b811f14ffe5}{% family={Swaine}, familyi={S\bibinitperiod}, given={Michael}, giveni={M\bibinitperiod}}}% } \list{publisher}{1}{% {McGraw-Hill}% } \strng{namehash}{ca99d1758e4beb9842f62e3a5c030576} \strng{fullhash}{ca99d1758e4beb9842f62e3a5c030576} \strng{bibnamehash}{ca99d1758e4beb9842f62e3a5c030576} \strng{authorbibnamehash}{ca99d1758e4beb9842f62e3a5c030576} \strng{authornamehash}{ca99d1758e4beb9842f62e3a5c030576} \strng{authorfullhash}{ca99d1758e4beb9842f62e3a5c030576} \field{sortinit}{F} \field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Fire in the Valley: The Birth and Death of the Personal Computer} \field{year}{2000} \endentry \entry{gopikrishna2021novel}{thesis}{} \name{author}{1}{}{% {{hash=9867142dbcfb52fac76189436d952c3c}{% family={Gopikrishna}, familyi={G\bibinitperiod}, given={Siddula}, giveni={S\bibinitperiod}}}% } \list{institution}{1}{% {International Institute of Information Technology, Hyderabad}% } \list{location}{1}{% {Hyderabad, India}% } \strng{namehash}{9867142dbcfb52fac76189436d952c3c} \strng{fullhash}{9867142dbcfb52fac76189436d952c3c} \strng{bibnamehash}{9867142dbcfb52fac76189436d952c3c} \strng{authorbibnamehash}{9867142dbcfb52fac76189436d952c3c} \strng{authornamehash}{9867142dbcfb52fac76189436d952c3c} \strng{authorfullhash}{9867142dbcfb52fac76189436d952c3c} \field{sortinit}{G} \field{sortinithash}{32d67eca0634bf53703493fb1090a2e8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{2} \field{note}{Accessed: 2024-08-24} \field{title}{A Novel Impedance Calibration Method for Low Cost Memory Applications} \field{type}{Master of Science Thesis} \field{year}{2021} \verb{urlraw} \verb https://cdn.iiit.ac.in/cdn/web2py.iiit.ac.in/research_centres/publications/download/mastersthesis.pdf.a761b452d5c4ae57.476f70696b726973686e615f4d537468657369735f3230303935303034392e706466.pdf \endverb \verb{url} \verb https://cdn.iiit.ac.in/cdn/web2py.iiit.ac.in/research_centres/publications/download/mastersthesis.pdf.a761b452d5c4ae57.476f70696b726973686e615f4d537468657369735f3230303935303034392e706466.pdf \endverb \endentry \entry{blackhat_me_hack}{article}{} \name{author}{2}{}{% {{hash=e450be1043f8bd6abbfc1a479f2d7700}{% family={Goryachy}, familyi={G\bibinitperiod}, given={Maxim}, giveni={M\bibinitperiod}}}% {{hash=1d6029a2369e520927fdca29718123a0}{% family={Ermolov}, familyi={E\bibinitperiod}, given={Mark}, giveni={M\bibinitperiod}}}% } \strng{namehash}{6053ddd30f543c5477a5425e5b6b645a} \strng{fullhash}{6053ddd30f543c5477a5425e5b6b645a} \strng{bibnamehash}{6053ddd30f543c5477a5425e5b6b645a} \strng{authorbibnamehash}{6053ddd30f543c5477a5425e5b6b645a} \strng{authornamehash}{6053ddd30f543c5477a5425e5b6b645a} \strng{authorfullhash}{6053ddd30f543c5477a5425e5b6b645a} \field{sortinit}{G} \field{sortinithash}{32d67eca0634bf53703493fb1090a2e8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Black Hat Europe} \field{title}{How to Hack a Turned Off Computer, or Running Unsigned Code in Intel Management Engine} \field{year}{2017} \field{pages}{1\bibrangedash 23} \range{pages}{23} \verb{urlraw} \verb https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf \endverb \verb{url} \verb https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf \endverb \endentry \entry{grewal_ibm_pc}{misc}{} \name{author}{1}{}{% {{hash=4296abffda91fa0c8d79d848107a62ed}{% family={Grewal}, familyi={G\bibinitperiod}, given={Jimmy}, giveni={J\bibinitperiod}}}% } \strng{namehash}{4296abffda91fa0c8d79d848107a62ed} \strng{fullhash}{4296abffda91fa0c8d79d848107a62ed} \strng{bibnamehash}{4296abffda91fa0c8d79d848107a62ed} \strng{authorbibnamehash}{4296abffda91fa0c8d79d848107a62ed} \strng{authornamehash}{4296abffda91fa0c8d79d848107a62ed} \strng{authorfullhash}{4296abffda91fa0c8d79d848107a62ed} \field{sortinit}{G} \field{sortinithash}{32d67eca0634bf53703493fb1090a2e8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{Armonk Institute} \field{title}{The Creation of the IBM PC} \field{year}{2024} \endentry \entry{acpi_os_support}{article}{} \name{author}{1}{}{% {{hash=d41895e4fca09a2ffb0c95190f6d6aca}{% family={Gschwind}, familyi={G\bibinitperiod}, given={Michael}, giveni={M\bibinitperiod}}}% } \strng{namehash}{d41895e4fca09a2ffb0c95190f6d6aca} \strng{fullhash}{d41895e4fca09a2ffb0c95190f6d6aca} \strng{bibnamehash}{d41895e4fca09a2ffb0c95190f6d6aca} \strng{authorbibnamehash}{d41895e4fca09a2ffb0c95190f6d6aca} \strng{authornamehash}{d41895e4fca09a2ffb0c95190f6d6aca} \strng{authorfullhash}{d41895e4fca09a2ffb0c95190f6d6aca} \field{sortinit}{G} \field{sortinithash}{32d67eca0634bf53703493fb1090a2e8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{IEEE Micro} \field{title}{Advanced Configuration and Power Interface: The Operating System Perspective} \field{volume}{20} \field{year}{2000} \field{pages}{82\bibrangedash 89} \range{pages}{8} \verb{doi} \verb 10.1109/40.888702 \endverb \endentry \entry{HaiYa2024Awah}{article}{} \name{author}{5}{}{% {{hash=82476f74d1aa84fe5485d95cc0300627}{% family={Hai}, familyi={H\bibinitperiod}, given={Ya}, giveni={Y\bibinitperiod}}}% {{hash=0138deaf332692ced30d823b9cebc488}{% family={Liu}, familyi={L\bibinitperiod}, given={Fei}, giveni={F\bibinitperiod}}}% {{hash=b2fd4f53b1682ad08d45675c5176cc23}{% family={Wang}, familyi={W\bibinitperiod}, given={Yongshan}, giveni={Y\bibinitperiod}}}% {{hash=64c07533f16224f4ccf4b077a5c83862}{% family={Fu}, familyi={F\bibinitperiod}, given={Liyin}, giveni={L\bibinitperiod}}}% {{hash=e731d63b9ff656be7ffed30b9350e444}{% family={Huo}, familyi={H\bibinitperiod}, given={Jian}, giveni={J\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{publisher}{1}{% {Elsevier Ltd}% } \strng{namehash}{4342b97637f2f5c989781de1c21b5b75} \strng{fullhash}{69b66a3731899e73435dc338915031a4} \strng{bibnamehash}{4342b97637f2f5c989781de1c21b5b75} \strng{authorbibnamehash}{4342b97637f2f5c989781de1c21b5b75} \strng{authornamehash}{4342b97637f2f5c989781de1c21b5b75} \strng{authorfullhash}{69b66a3731899e73435dc338915031a4} \field{sortinit}{H} \field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{1879-2391} \field{journaltitle}{Microelectronics} \field{title}{A wide-frequency and high-precision ZQ calibration circuit for NAND Flash memory} \field{volume}{143} \field{year}{2024} \true{nocite} \field{pages}{106051\bibrangedash} \range{pages}{-1} \endentry \entry{heasman2007}{article}{} \name{author}{1}{}{% {{hash=433d3e3ec136bfc723af40458ccae9c5}{% family={Heasman}, familyi={H\bibinitperiod}, given={John}, giveni={J\bibinitperiod}}}% } \strng{namehash}{433d3e3ec136bfc723af40458ccae9c5} \strng{fullhash}{433d3e3ec136bfc723af40458ccae9c5} \strng{bibnamehash}{433d3e3ec136bfc723af40458ccae9c5} \strng{authorbibnamehash}{433d3e3ec136bfc723af40458ccae9c5} \strng{authornamehash}{433d3e3ec136bfc723af40458ccae9c5} \strng{authorfullhash}{433d3e3ec136bfc723af40458ccae9c5} \field{sortinit}{H} \field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Black Hat USA} \field{title}{Implementing and Detecting an ACPI BIOS Rootkit} \field{year}{2007} \verb{urlraw} \verb https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf \endverb \verb{url} \verb https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf \endverb \endentry \entry{hill_impact_caching}{article}{} \name{author}{2}{}{% {{hash=c5fd1af61abfb4398ded7625bf0ea46f}{% family={Hill}, familyi={H\bibinitperiod}, given={M.\bibnamedelimi D.}, giveni={M\bibinitperiod\bibinitdelim D\bibinitperiod}}}% {{hash=2d42b38cfbd98455927c6acaf50b3c5e}{% family={Marty}, familyi={M\bibinitperiod}, given={M.\bibnamedelimi R.}, giveni={M\bibinitperiod\bibinitdelim R\bibinitperiod}}}% } \list{publisher}{1}{% {ACM}% } \strng{namehash}{747d589c93ffb32b514aaefd75b1a4ce} \strng{fullhash}{747d589c93ffb32b514aaefd75b1a4ce} \strng{bibnamehash}{747d589c93ffb32b514aaefd75b1a4ce} \strng{authorbibnamehash}{747d589c93ffb32b514aaefd75b1a4ce} \strng{authornamehash}{747d589c93ffb32b514aaefd75b1a4ce} \strng{authorfullhash}{747d589c93ffb32b514aaefd75b1a4ce} \field{sortinit}{H} \field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Communications of the ACM} \field{number}{12} \field{title}{The Impact of Caching on Multicore Performance} \field{volume}{51} \field{year}{2008} \field{pages}{48\bibrangedash 54} \range{pages}{7} \endentry \entry{huang2009invisible}{inproceedings}{} \name{author}{2}{}{% {{hash=87de624435b4bb727ab42d0fecb06b84}{% family={Huang}, familyi={H\bibinitperiod}, given={Rich}, giveni={R\bibinitperiod}}}% {{hash=5d0ddda3a367ceb26fbaeca02e391c22}{% family={Smith}, familyi={S\bibinitperiod}, given={John}, giveni={J\bibinitperiod}}}% } \list{organization}{1}{% {ACM}% } \strng{namehash}{230eb9fcc0a53acffc076a3fe8c94cda} \strng{fullhash}{230eb9fcc0a53acffc076a3fe8c94cda} \strng{bibnamehash}{230eb9fcc0a53acffc076a3fe8c94cda} \strng{authorbibnamehash}{230eb9fcc0a53acffc076a3fe8c94cda} \strng{authornamehash}{230eb9fcc0a53acffc076a3fe8c94cda} \strng{authorfullhash}{230eb9fcc0a53acffc076a3fe8c94cda} \field{sortinit}{H} \field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the 16th ACM Conference on Computer and Communications Security} \field{title}{Invisible Hypervisor: An Analysis of System Management Mode} \field{year}{2009} \field{pages}{25\bibrangedash 35} \range{pages}{11} \endentry \entry{micron_ddr3}{manual}{} \name{author}{1}{}{% {{hash=bb9782d6d5d1c95c67b7b316cc17615a}{% family={Inc}, familyi={I\bibinitperiod}, given={Micron\bibnamedelima Technology}, giveni={M\bibinitperiod\bibinitdelim T\bibinitperiod}}}% } \strng{namehash}{bb9782d6d5d1c95c67b7b316cc17615a} \strng{fullhash}{bb9782d6d5d1c95c67b7b316cc17615a} \strng{bibnamehash}{bb9782d6d5d1c95c67b7b316cc17615a} \strng{authorbibnamehash}{bb9782d6d5d1c95c67b7b316cc17615a} \strng{authornamehash}{bb9782d6d5d1c95c67b7b316cc17615a} \strng{authorfullhash}{bb9782d6d5d1c95c67b7b316cc17615a} \field{sortinit}{I} \field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{number}{TN-41-02} \field{title}{Technical Note: DDR3 ZQ Calibration} \field{year}{2008} \endentry \entry{intel_me}{misc}{} \name{author}{1}{}{% {{hash=b7f0fb90e404efb48f8a85a517dec3c9}{% family={{Intel Corporation}}, familyi={I\bibinitperiod}}}% } \strng{namehash}{b7f0fb90e404efb48f8a85a517dec3c9} \strng{fullhash}{b7f0fb90e404efb48f8a85a517dec3c9} \strng{bibnamehash}{b7f0fb90e404efb48f8a85a517dec3c9} \strng{authorbibnamehash}{b7f0fb90e404efb48f8a85a517dec3c9} \strng{authornamehash}{b7f0fb90e404efb48f8a85a517dec3c9} \strng{authorfullhash}{b7f0fb90e404efb48f8a85a517dec3c9} \field{sortinit}{I} \field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.intel.com/content/www/us/en/architecture-and-technology/intel-management-engine.html}} \field{note}{Accessed: 2024-07-05} \field{title}{Intel Management Engine (Intel ME)} \true{nocite} \endentry \entry{netgarage_intel_me}{online}{} \name{author}{1}{}{% {{hash=64eb2dd5b853ed2e3e6ede4df0c13b5a}{% family={io.netgarage}, familyi={i\bibinitperiod}}}% } \strng{namehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a} \strng{fullhash}{64eb2dd5b853ed2e3e6ede4df0c13b5a} \strng{bibnamehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a} \strng{authorbibnamehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a} \strng{authornamehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a} \strng{authorfullhash}{64eb2dd5b853ed2e3e6ede4df0c13b5a} \field{sortinit}{i} \field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Intel Management Engine} \field{year}{2024} \verb{urlraw} \verb https://io.netgarage.org/me/ \endverb \verb{url} \verb https://io.netgarage.org/me/ \endverb \endentry \entry{openbmc_customization}{article}{} \name{author}{1}{}{% {{hash=5a25bc91f524ca6dfc2ecf9f4a13903c}{% family={Jones}, familyi={J\bibinitperiod}, given={Michael}, giveni={M\bibinitperiod}}}% } \list{publisher}{1}{% {Open Source Press}% } \strng{namehash}{5a25bc91f524ca6dfc2ecf9f4a13903c} \strng{fullhash}{5a25bc91f524ca6dfc2ecf9f4a13903c} \strng{bibnamehash}{5a25bc91f524ca6dfc2ecf9f4a13903c} \strng{authorbibnamehash}{5a25bc91f524ca6dfc2ecf9f4a13903c} \strng{authornamehash}{5a25bc91f524ca6dfc2ecf9f4a13903c} \strng{authorfullhash}{5a25bc91f524ca6dfc2ecf9f4a13903c} \field{sortinit}{J} \field{sortinithash}{b2f54a9081ace9966a7cb9413811edb4} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Open Source Firmware Journal} \field{number}{1} \field{title}{Customizing OpenBMC for ASpeed AST2050} \field{volume}{5} \field{year}{2017} \field{pages}{12\bibrangedash 18} \range{pages}{7} \endentry \entry{offsec_bios_smm}{article}{} \name{author}{2}{}{% {{hash=5f0adf197576f745db5616612237177f}{% family={Kallenberg}, familyi={K\bibinitperiod}, given={Corey}, giveni={C\bibinitperiod}}}% {{hash=befb18be37cd351fd592753473a8806e}{% family={Kovah}, familyi={K\bibinitperiod}, given={Xeno}, giveni={X\bibinitperiod}}}% } \strng{namehash}{70fa1c8368a19b98e1600548ec87ea1f} \strng{fullhash}{70fa1c8368a19b98e1600548ec87ea1f} \strng{bibnamehash}{70fa1c8368a19b98e1600548ec87ea1f} \strng{authorbibnamehash}{70fa1c8368a19b98e1600548ec87ea1f} \strng{authornamehash}{70fa1c8368a19b98e1600548ec87ea1f} \strng{authorfullhash}{70fa1c8368a19b98e1600548ec87ea1f} \field{sortinit}{K} \field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{BIOS and SMM Internals} \field{year}{2014} \verb{urlraw} \verb https://opensecuritytraining.info/IntroBIOS_files/Day1_07_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMM.pdf \endverb \verb{url} \verb https://opensecuritytraining.info/IntroBIOS_files/Day1_07_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMM.pdf \endverb \endentry \entry{amd_psp_overview}{inproceedings}{} \name{author}{3}{}{% {{hash=9aa60a0635fc104c28dda319ab8cca3d}{% family={Kaplan}, familyi={K\bibinitperiod}, given={David}, giveni={D\bibinitperiod}}}% {{hash=50223c62dee7675ba8f24e625d026c27}{% family={Powell}, familyi={P\bibinitperiod}, given={Jeremy}, giveni={J\bibinitperiod}}}% {{hash=f05ca959cba94cb91d78975fcbee4787}{% family={Woller}, familyi={W\bibinitperiod}, given={Tom}, giveni={T\bibinitperiod}}}% } \strng{namehash}{b5e851ee8429e8e91668d1d3551901cd} \strng{fullhash}{b5e851ee8429e8e91668d1d3551901cd} \strng{bibnamehash}{b5e851ee8429e8e91668d1d3551901cd} \strng{authorbibnamehash}{b5e851ee8429e8e91668d1d3551901cd} \strng{authornamehash}{b5e851ee8429e8e91668d1d3551901cd} \strng{authorfullhash}{b5e851ee8429e8e91668d1d3551901cd} \field{sortinit}{K} \field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Architectural Support for Programming Languages and Operating Systems} \field{title}{AMD Memory Encryption} \field{year}{2016} \field{pages}{149\bibrangedash 160} \range{pages}{12} \verb{doi} \verb 10.1145/2851141.2851148 \endverb \endentry \entry{kim2010design}{inproceedings}{} \name{author}{3}{}{% {{hash=8220787d0eaa6f1c680840bf616c1cf4}{% family={Kim}, familyi={K\bibinitperiod}, given={Dong-Seok}, giveni={D\bibinithyphendelim S\bibinitperiod}}}% {{hash=296a3e46de4ab457e55baf6264bb8637}{% family={Oh}, familyi={O\bibinitperiod}, given={Dong-Seok}, giveni={D\bibinithyphendelim S\bibinitperiod}}}% {{hash=f73fbd8e5fd85d5a4945843500511870}{% family={Lee}, familyi={L\bibinitperiod}, given={Seok-Hoon}, giveni={S\bibinithyphendelim H\bibinitperiod}}}% } \list{location}{1}{% {Seoul, South Korea}% } \list{publisher}{1}{% {Hanyang University}% } \strng{namehash}{c95e43f58c55dbd4375f1961197becbf} \strng{fullhash}{c95e43f58c55dbd4375f1961197becbf} \strng{bibnamehash}{c95e43f58c55dbd4375f1961197becbf} \strng{authorbibnamehash}{c95e43f58c55dbd4375f1961197becbf} \strng{authornamehash}{c95e43f58c55dbd4375f1961197becbf} \strng{authorfullhash}{c95e43f58c55dbd4375f1961197becbf} \field{sortinit}{K} \field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the 2010 Fall Conference on Semiconductor and Display Technology} \field{note}{Retrieved from https://koreascience.kr/article/CFKO200835536002505.pdf} \field{title}{Design DDR3 ZQ Calibration having improved impedance matching} \field{year}{2010} \field{pages}{191\bibrangedash 192} \range{pages}{2} \endentry \entry{uefi_smm_security}{book}{} \name{author}{3}{}{% {{hash=0f5d712d2df5a2eb138c92b8957c02fe}{% family={Krebs}, familyi={K\bibinitperiod}, given={Ronald\bibnamedelima D.}, giveni={R\bibinitperiod\bibinitdelim D\bibinitperiod}}}% {{hash=607b9f5f93f583fb8a4a28cc4a5937ae}{% family={Zimmer}, familyi={Z\bibinitperiod}, given={Vincent}, giveni={V\bibinitperiod}}}% {{hash=15304da870cc73994d161d9c4681f167}{% family={Marisetty}, familyi={M\bibinitperiod}, given={Suresh}, giveni={S\bibinitperiod}}}% } \list{publisher}{1}{% {Intel Press}% } \strng{namehash}{e3efa1b46cc11cf21c59b308c4a3951d} \strng{fullhash}{e3efa1b46cc11cf21c59b308c4a3951d} \strng{bibnamehash}{e3efa1b46cc11cf21c59b308c4a3951d} \strng{authorbibnamehash}{e3efa1b46cc11cf21c59b308c4a3951d} \strng{authornamehash}{e3efa1b46cc11cf21c59b308c4a3951d} \strng{authorfullhash}{e3efa1b46cc11cf21c59b308c4a3951d} \field{sortinit}{K} \field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{edition}{3rd} \field{isbn}{978-0974364906} \field{title}{Beyond BIOS: Developing with the Unified Extensible Firmware Interface} \field{year}{2017} \endentry \entry{heise_amt_attack}{online}{} \name{author}{1}{}{% {{hash=b7a2e18f77259e34d5b676fd04412bb3}{% family={Krempl}, familyi={K\bibinitperiod}, given={Stefan}, giveni={S\bibinitperiod}}}% } \strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3} \strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3} \strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3} \strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3} \strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3} \strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3} \field{sortinit}{K} \field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Intel-Fernwartung AMT bei Angriffen auf PCs genutzt} \field{year}{2017} \true{nocite} \verb{urlraw} \verb https://www.heise.de/news/Intel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html \endverb \verb{url} \verb https://www.heise.de/news/Intel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html \endverb \endentry \entry{numa}{article}{} \name{author}{1}{}{% {{hash=419af6f87214eb9f2bfa2a03a877cb04}{% family={Lameter}, familyi={L\bibinitperiod}, given={Christoph}, giveni={C\bibinitperiod}}}% } \strng{namehash}{419af6f87214eb9f2bfa2a03a877cb04} \strng{fullhash}{419af6f87214eb9f2bfa2a03a877cb04} \strng{bibnamehash}{419af6f87214eb9f2bfa2a03a877cb04} \strng{authorbibnamehash}{419af6f87214eb9f2bfa2a03a877cb04} \strng{authornamehash}{419af6f87214eb9f2bfa2a03a877cb04} \strng{authorfullhash}{419af6f87214eb9f2bfa2a03a877cb04} \field{sortinit}{L} \field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Queue} \field{month}{07} \field{title}{NUMA (Non-Uniform Memory Access): An Overview} \field{volume}{11} \field{year}{2013} \true{nocite} \verb{doi} \verb 10.1145/2508834.2513149 \endverb \endentry \entry{phoronix_hdcp_2_2_i915}{online}{} \name{author}{1}{}{% {{hash=b51b9464b5589cf5380e3b897d0a43b6}{% family={Larabel}, familyi={L\bibinitperiod}, given={Michael}, giveni={M\bibinitperiod}}}% } \strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6} \field{extraname}{1} \field{sortinit}{L} \field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{HDCP 2.2 Coming To The Intel i915 Linux DRM Driver} \field{year}{2018} \verb{urlraw} \verb https://www.phoronix.com/news/HDCP-2.2-For-i915-DRM \endverb \verb{url} \verb https://www.phoronix.com/news/HDCP-2.2-For-i915-DRM \endverb \endentry \entry{phoronix_hdcp_2_2_driver}{online}{} \name{author}{1}{}{% {{hash=b51b9464b5589cf5380e3b897d0a43b6}{% family={Larabel}, familyi={L\bibinitperiod}, given={Michael}, giveni={M\bibinitperiod}}}% } \strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6} \strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6} \field{extraname}{2} \field{sortinit}{L} \field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{HDCP 2.2 Support Being Worked On For Intel Linux Graphics Driver} \field{year}{2017} \true{nocite} \verb{urlraw} \verb https://www.phoronix.com/news/HDCP-2.2-Intel-Linux-Driver \endverb \verb{url} \verb https://www.phoronix.com/news/HDCP-2.2-Intel-Linux-Driver \endverb \endentry \entry{cyber_smm_hack}{report}{} \name{author}{4}{}{% {{hash=e0fdb42b953ef541418307b69787da0c}{% family={Levillain}, familyi={L\bibinitperiod}, given={Olivier}, giveni={O\bibinitperiod}}}% {{hash=905dd1958bf443fbba3af917505aca40}{% family={Francillon}, familyi={F\bibinitperiod}, given={Aurelien}, giveni={A\bibinitperiod}}}% {{hash=6adb386609edde844be6de64fdefae58}{% family={Fratantonio}, familyi={F\bibinitperiod}, given={Yanick}, giveni={Y\bibinitperiod}}}% {{hash=14cb44e160bd085923d2216f78867ae2}{% family={Balzarotti}, familyi={B\bibinitperiod}, given={Davide}, giveni={D\bibinitperiod}}}% } \list{institution}{1}{% {ANSSI, Eurecom}% } \strng{namehash}{153c7a919bb6611940c22d22f6bc457e} \strng{fullhash}{08e99c283b578e98b81e72ebd0e9b364} \strng{bibnamehash}{153c7a919bb6611940c22d22f6bc457e} \strng{authorbibnamehash}{153c7a919bb6611940c22d22f6bc457e} \strng{authornamehash}{153c7a919bb6611940c22d22f6bc457e} \strng{authorfullhash}{08e99c283b578e98b81e72ebd0e9b364} \field{sortinit}{L} \field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{How to Protect the BIOS and its Secrets} \field{type}{techreport} \field{year}{2011} \verb{urlraw} \verb https://cyber.gouv.fr/sites/default/files/IMG/pdf/Cansec_final.pdf \endverb \verb{url} \verb https://cyber.gouv.fr/sites/default/files/IMG/pdf/Cansec_final.pdf \endverb \endentry \entry{LiHuiyong2014RRoD}{article}{} \name{author}{4}{}{% {{hash=5372cdbd3052ccafb8205b01ca06d602}{% family={Li}, familyi={L\bibinitperiod}, given={Huiyong}, giveni={H\bibinitperiod}}}% {{hash=14f153fc939f9cdd32dcf4e81e3246d5}{% family={Jiang}, familyi={J\bibinitperiod}, given={Hongxu}, giveni={H\bibinitperiod}}}% {{hash=a9c8728e355996d027a7e56b60820a18}{% family={Li}, familyi={L\bibinitperiod}, given={Bo}, giveni={B\bibinitperiod}}}% {{hash=a4bbc4ff61eed77cccdacec89a39b2c6}{% family={Duan}, familyi={D\bibinitperiod}, given={Miyi}, giveni={M\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{location}{1}{% {United States}% } \list{publisher}{1}{% {Hindawi Publishing Corporation}% } \strng{namehash}{2dbb6be882893005ad907124afa1f218} \strng{fullhash}{e9ffcb79d98e9c0c1203b8f7d307dab3} \strng{bibnamehash}{2dbb6be882893005ad907124afa1f218} \strng{authorbibnamehash}{2dbb6be882893005ad907124afa1f218} \strng{authornamehash}{2dbb6be882893005ad907124afa1f218} \strng{authorfullhash}{e9ffcb79d98e9c0c1203b8f7d307dab3} \field{sortinit}{L} \field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{2356-6140} \field{journaltitle}{TheScientificWorld} \field{title}{Reflection Reduction on DDR3 High-Speed Bus by Improved PSO} \field{volume}{2014} \field{year}{2014} \true{nocite} \field{pages}{257972\bibrangedash 11} \range{pages}{-60} \keyw{Algorithms ; Buses ; Efficiency ; Experiments ; Mathematical models ; Mathematical optimization ; Motor vehicles ; Properties ; Reading ; Signals and signaling} \endentry \entry{samsung_ddr3}{manual}{} \name{author}{1}{}{% {{hash=18ee2446b26d5ac68be7ad188faa3f28}{% family={Ltd}, familyi={L\bibinitperiod}, given={Samsung\bibnamedelimb Electronics\bibnamedelima Co.}, giveni={S\bibinitperiod\bibinitdelim E\bibinitperiod\bibinitdelim C\bibinitperiod}}}% } \strng{namehash}{18ee2446b26d5ac68be7ad188faa3f28} \strng{fullhash}{18ee2446b26d5ac68be7ad188faa3f28} \strng{bibnamehash}{18ee2446b26d5ac68be7ad188faa3f28} \strng{authorbibnamehash}{18ee2446b26d5ac68be7ad188faa3f28} \strng{authornamehash}{18ee2446b26d5ac68be7ad188faa3f28} \strng{authorfullhash}{18ee2446b26d5ac68be7ad188faa3f28} \field{sortinit}{L} \field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{month}{11} \field{number}{TN-41-02} \field{title}{DDR3 SDRAM Specification Rev 1.4} \field{year}{2011} \endentry \entry{blobs}{misc}{} \name{author}{1}{}{% {{hash=368573a2727cae4111de5ad066039578}{% family={maintainers}, familyi={m\bibinitperiod}, given={GNU\bibnamedelima Boot}, giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod}, prefix={project}, prefixi={p\bibinitperiod}}}% } \strng{namehash}{368573a2727cae4111de5ad066039578} \strng{fullhash}{368573a2727cae4111de5ad066039578} \strng{bibnamehash}{368573a2727cae4111de5ad066039578} \strng{authorbibnamehash}{368573a2727cae4111de5ad066039578} \strng{authornamehash}{368573a2727cae4111de5ad066039578} \strng{authorfullhash}{368573a2727cae4111de5ad066039578} \field{extraname}{1} \field{sortinit}{m} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.gnu.org/software/gnuboot/web/faq.html}} \field{note}{Accessed: 2024-07-23} \field{title}{Frequently Asked Questions} \endentry \entry{gnuboot}{misc}{} \name{author}{1}{}{% {{hash=368573a2727cae4111de5ad066039578}{% family={maintainers}, familyi={m\bibinitperiod}, given={GNU\bibnamedelima Boot}, giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod}, prefix={project}, prefixi={p\bibinitperiod}}}% } \strng{namehash}{368573a2727cae4111de5ad066039578} \strng{fullhash}{368573a2727cae4111de5ad066039578} \strng{bibnamehash}{368573a2727cae4111de5ad066039578} \strng{authorbibnamehash}{368573a2727cae4111de5ad066039578} \strng{authornamehash}{368573a2727cae4111de5ad066039578} \strng{authorfullhash}{368573a2727cae4111de5ad066039578} \field{extraname}{2} \field{sortinit}{m} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{GNU Boot --- Free your BIOS today!} \field{year}{2024} \verb{urlraw} \verb https://www.gnu.org/software/gnuboot/ \endverb \verb{url} \verb https://www.gnu.org/software/gnuboot/ \endverb \endentry \entry{gnuboot_status}{misc}{} \name{author}{1}{}{% {{hash=368573a2727cae4111de5ad066039578}{% family={maintainers}, familyi={m\bibinitperiod}, given={GNU\bibnamedelima Boot}, giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod}, prefix={project}, prefixi={p\bibinitperiod}}}% } \strng{namehash}{368573a2727cae4111de5ad066039578} \strng{fullhash}{368573a2727cae4111de5ad066039578} \strng{bibnamehash}{368573a2727cae4111de5ad066039578} \strng{authorbibnamehash}{368573a2727cae4111de5ad066039578} \strng{authornamehash}{368573a2727cae4111de5ad066039578} \strng{authorfullhash}{368573a2727cae4111de5ad066039578} \field{extraname}{3} \field{sortinit}{m} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{GNU Boot --- Status} \field{year}{2024} \verb{urlraw} \verb https://www.gnu.org/software/gnuboot/web/status.html \endverb \verb{url} \verb https://www.gnu.org/software/gnuboot/web/status.html \endverb \endentry \entry{markuze2021}{inproceedings}{} \name{author}{7}{}{% {{hash=bddf7b21e1c8949d4103f016bbdbf08f}{% family={Markuze}, familyi={M\bibinitperiod}, given={Alex}, giveni={A\bibinitperiod}}}% {{hash=4d511e0a6f00c8ad5dab79333097c89a}{% family={Vargaftik}, familyi={V\bibinitperiod}, given={Shay}, giveni={S\bibinitperiod}}}% {{hash=566b0f1f830072ac0d45f6ef80b04254}{% family={Kupfer}, familyi={K\bibinitperiod}, given={Gil}, giveni={G\bibinitperiod}}}% {{hash=a287912a74a981d9138e6ab9f22c55c5}{% family={Pismenny}, familyi={P\bibinitperiod}, given={Boris}, giveni={B\bibinitperiod}}}% {{hash=b37f5c4b4ff4d2c5c57d026a8a01e86a}{% family={Amit}, familyi={A\bibinitperiod}, given={Nadav}, giveni={N\bibinitperiod}}}% {{hash=3959b4901b01ec379cdb6e26d406f37d}{% family={Morrison}, familyi={M\bibinitperiod}, given={Adam}, giveni={A\bibinitperiod}}}% {{hash=d4e54c84413641d186ef3461d7e0d1f7}{% family={Tsafrir}, familyi={T\bibinitperiod}, given={Dan}, giveni={D\bibinitperiod}}}% } \list{publisher}{1}{% {ACM}% } \strng{namehash}{7df12f9031d9ee32c2b44bcc39f18d9d} \strng{fullhash}{ec0a172ad1c93eebd683b01a914d1db6} \strng{bibnamehash}{7df12f9031d9ee32c2b44bcc39f18d9d} \strng{authorbibnamehash}{7df12f9031d9ee32c2b44bcc39f18d9d} \strng{authornamehash}{7df12f9031d9ee32c2b44bcc39f18d9d} \strng{authorfullhash}{ec0a172ad1c93eebd683b01a914d1db6} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the Sixteenth European Conference on Computer Systems (EuroSys '21)} \field{title}{Understanding DMA Attacks in the Presence of an IOMMU} \field{year}{2021} \verb{urlraw} \verb https://research.vmware.com/publications/understanding-dma-attacks-in-the-presence-of-an-iommu \endverb \verb{url} \verb https://research.vmware.com/publications/understanding-dma-attacks-in-the-presence-of-an-iommu \endverb \endentry \entry{mcclean2017uefi}{book}{} \name{author}{1}{}{% {{hash=c75cb68c65bcee56f0aa882d79503b7b}{% family={McClean}, familyi={M\bibinitperiod}, given={Laura}, giveni={L\bibinitperiod}}}% } \list{publisher}{1}{% {O'Reilly Media}% } \strng{namehash}{c75cb68c65bcee56f0aa882d79503b7b} \strng{fullhash}{c75cb68c65bcee56f0aa882d79503b7b} \strng{bibnamehash}{c75cb68c65bcee56f0aa882d79503b7b} \strng{authorbibnamehash}{c75cb68c65bcee56f0aa882d79503b7b} \strng{authornamehash}{c75cb68c65bcee56f0aa882d79503b7b} \strng{authorfullhash}{c75cb68c65bcee56f0aa882d79503b7b} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{UEFI: The Definitive Guide to Modern Firmware} \field{year}{2017} \endentry \entry{medeiros2017}{article}{} \name{author}{6}{}{% {{hash=cd5b56523e512e29ac9cad15b1818b81}{% family={Medeiros}, familyi={M\bibinitperiod}, given={Ivison}, giveni={I\bibinitperiod}}}% {{hash=81aac05bbc300ff1dbbe6a7ddbe4f9f9}{% family={Oliveira\bibnamedelima Dutra}, familyi={O\bibinitperiod\bibinitdelim D\bibinitperiod}, given={Jonathan}, giveni={J\bibinitperiod}, prefix={de}, prefixi={d\bibinitperiod}}}% {{hash=2413e19308f20bc8fa40f233758c88c0}{% family={Silva}, familyi={S\bibinitperiod}, given={Anderson\bibnamedelima Faustino}, giveni={A\bibinitperiod\bibinitdelim F\bibinitperiod}, prefix={da}, prefixi={d\bibinitperiod}}}% {{hash=5f41c346d6f1b5bae7683d20592f3fc9}{% family={Bigonha}, familyi={B\bibinitperiod}, given={Rafael\bibnamedelima Silva}, giveni={R\bibinitperiod\bibinitdelim S\bibinitperiod}}}% {{hash=df7428155f9dd9261cff7e2e0db2fb72}{% family={Anquetil}, familyi={A\bibinitperiod}, given={Nicolas}, giveni={N\bibinitperiod}}}% {{hash=75e1e4e2c87fe37bb8edbe9563815011}{% family={Ducasse}, familyi={D\bibinitperiod}, given={Stéphane}, giveni={S\bibinitperiod}}}% } \strng{namehash}{7fc239c45cb70d84978e99f949cde22a} \strng{fullhash}{9df4f50abd9fd1266efe374274366054} \strng{bibnamehash}{7fc239c45cb70d84978e99f949cde22a} \strng{authorbibnamehash}{7fc239c45cb70d84978e99f949cde22a} \strng{authornamehash}{7fc239c45cb70d84978e99f949cde22a} \strng{authorfullhash}{9df4f50abd9fd1266efe374274366054} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Journal of the Brazilian Computer Society} \field{number}{1} \field{title}{Towards a dynamic data distribution management framework based on Apache Spark} \field{volume}{23} \field{year}{2017} \field{pages}{1\bibrangedash 15} \range{pages}{15} \verb{doi} \verb 10.1186/s13173-017-0066-7 \endverb \verb{urlraw} \verb https://journal-bcs.springeropen.com/articles/10.1186/s13173-017-0066-7 \endverb \verb{url} \verb https://journal-bcs.springeropen.com/articles/10.1186/s13173-017-0066-7 \endverb \endentry \entry{coreboot_challenges}{article}{} \name{author}{2}{}{% {{hash=af33676c3a4888dfa26a657f486708df}{% family={Minnich}, familyi={M\bibinitperiod}, given={R.}, giveni={R\bibinitperiod}}}% {{hash=4f177e6be4bf4c60155596239dcc4b34}{% family={Hendricks}, familyi={H\bibinitperiod}, given={E.}, giveni={E\bibinitperiod}}}% } \strng{namehash}{4903c46d98ac613dcc8fd38bbe396ae4} \strng{fullhash}{4903c46d98ac613dcc8fd38bbe396ae4} \strng{bibnamehash}{4903c46d98ac613dcc8fd38bbe396ae4} \strng{authorbibnamehash}{4903c46d98ac613dcc8fd38bbe396ae4} \strng{authornamehash}{4903c46d98ac613dcc8fd38bbe396ae4} \strng{authorfullhash}{4903c46d98ac613dcc8fd38bbe396ae4} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Journal of Open Source Software} \field{number}{29} \field{title}{Challenges and Progress in coreboot Development} \field{volume}{3} \field{year}{2018} \field{pages}{1\bibrangedash 6} \range{pages}{6} \verb{doi} \verb 10.21105/joss.00429 \endverb \endentry \entry{minnich_status}{inproceedings}{} \name{author}{1}{}{% {{hash=996532a0f0ccb5fbf90b3fc854eb3fad}{% family={Minnich}, familyi={M\bibinitperiod}, given={Ron}, giveni={R\bibinitperiod}}}% } \strng{namehash}{996532a0f0ccb5fbf90b3fc854eb3fad} \strng{fullhash}{996532a0f0ccb5fbf90b3fc854eb3fad} \strng{bibnamehash}{996532a0f0ccb5fbf90b3fc854eb3fad} \strng{authorbibnamehash}{996532a0f0ccb5fbf90b3fc854eb3fad} \strng{authornamehash}{996532a0f0ccb5fbf90b3fc854eb3fad} \strng{authorfullhash}{996532a0f0ccb5fbf90b3fc854eb3fad} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{coreboot: Status and some history} \field{year}{2006} \true{nocite} \endentry \entry{minnich_coreboot}{article}{} \name{author}{3}{}{% {{hash=996532a0f0ccb5fbf90b3fc854eb3fad}{% family={Minnich}, familyi={M\bibinitperiod}, given={Ron}, giveni={R\bibinitperiod}}}% {{hash=338aa5983567160bd6e7d5d77184578a}{% family={Reinauer}, familyi={R\bibinitperiod}, given={Stefan}, giveni={S\bibinitperiod}}}% {{hash=f51f40aa097a46fae7ce40dcd09839f8}{% family={Georgi}, familyi={G\bibinitperiod}, given={Patrick}, giveni={P\bibinitperiod}}}% } \strng{namehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8} \strng{fullhash}{1d5b6a035ece056f3d14b3fb9dd1e2a8} \strng{bibnamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8} \strng{authorbibnamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8} \strng{authornamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8} \strng{authorfullhash}{1d5b6a035ece056f3d14b3fb9dd1e2a8} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Google Research} \field{title}{coreboot: Open-Source Firmware Platform} \field{year}{2017} \true{nocite} \verb{urlraw} \verb https://research.google/pubs/pub45424/ \endverb \verb{url} \verb https://research.google/pubs/pub45424/ \endverb \endentry \entry{mohr2012comparative}{report}{} \name{author}{1}{}{% {{hash=8e03e86ade8b47700c0dbfe66ab4829c}{% family={Mohr}, familyi={M\bibinitperiod}, given={Benjamin}, giveni={B\bibinitperiod}}}% } \list{institution}{1}{% {University of Freiburg}% } \strng{namehash}{8e03e86ade8b47700c0dbfe66ab4829c} \strng{fullhash}{8e03e86ade8b47700c0dbfe66ab4829c} \strng{bibnamehash}{8e03e86ade8b47700c0dbfe66ab4829c} \strng{authorbibnamehash}{8e03e86ade8b47700c0dbfe66ab4829c} \strng{authornamehash}{8e03e86ade8b47700c0dbfe66ab4829c} \strng{authorfullhash}{8e03e86ade8b47700c0dbfe66ab4829c} \field{sortinit}{M} \field{sortinithash}{4625c616857f13d17ce56f7d4f97d451} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{A Comparative Analysis of Bootloaders} \field{type}{techreport} \field{year}{2012} \endentry \entry{nuvoton}{manual}{} \name{author}{1}{}{% {{hash=3c26c5dfa62a2ce99c0fffbdbd5f69f3}{% family={{Nuvoton Technology Corporation}}, familyi={N\bibinitperiod}}}% } \strng{namehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3} \strng{fullhash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3} \strng{bibnamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3} \strng{authorbibnamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3} \strng{authornamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3} \strng{authorfullhash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3} \field{sortinit}{N} \field{sortinithash}{22369a73d5f88983a108b63f07f37084} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Nuvoton W83795G/ADG Hardware Monitor Datasheet} \verb{urlraw} \verb https://www.nuvoton.com/ \endverb \verb{url} \verb https://www.nuvoton.com/ \endverb \endentry \entry{eff_intel_me}{online}{} \name{author}{1}{}{% {{hash=4ffff1c6c9a41ed000b5647ade54accb}{% family={O’Brien}, familyi={O\bibinitperiod}, given={Danny}, giveni={D\bibinitperiod}}}% } \strng{namehash}{4ffff1c6c9a41ed000b5647ade54accb} \strng{fullhash}{4ffff1c6c9a41ed000b5647ade54accb} \strng{bibnamehash}{4ffff1c6c9a41ed000b5647ade54accb} \strng{authorbibnamehash}{4ffff1c6c9a41ed000b5647ade54accb} \strng{authornamehash}{4ffff1c6c9a41ed000b5647ade54accb} \strng{authorfullhash}{4ffff1c6c9a41ed000b5647ade54accb} \field{sortinit}{O} \field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Intel’s Management Engine is a Security Hazard, and Users Need a Way to Disable It} \field{year}{2017} \verb{urlraw} \verb https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it \endverb \verb{url} \verb https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it \endverb \endentry \entry{AlexanderOgolyuk2017UBaI}{article}{} \name{author}{3}{}{% {{hash=e471e22ecc8ac7b4a9a0aeef1178d250}{% family={Ogolyuk}, familyi={O\bibinitperiod}, given={Alexander}, giveni={A\bibinitperiod}}}% {{hash=6170c563f791330913063ddfb3794ab2}{% family={Sheglov}, familyi={S\bibinitperiod}, given={Andrey}, giveni={A\bibinitperiod}}}% {{hash=6ae0d6e6b1e57e62fd27bd8899d2b131}{% family={Sheglov}, familyi={S\bibinitperiod}, given={Konstantin}, giveni={K\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{publisher}{1}{% {FRUCT}% } \strng{namehash}{905455d8b9db1e1077b6dddccca21810} \strng{fullhash}{905455d8b9db1e1077b6dddccca21810} \strng{bibnamehash}{905455d8b9db1e1077b6dddccca21810} \strng{authorbibnamehash}{905455d8b9db1e1077b6dddccca21810} \strng{authornamehash}{905455d8b9db1e1077b6dddccca21810} \strng{authorfullhash}{905455d8b9db1e1077b6dddccca21810} \field{sortinit}{O} \field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{2305-7254} \field{journaltitle}{Proceedings of the XXth Conference of Open Innovations Association FRUCT} \field{number}{20} \field{title}{UEFI BIOS and Intel Management Engine Attack Vectors and Vulnerabilities} \field{volume}{776} \field{year}{2017} \true{nocite} \field{pages}{657\bibrangedash 662} \range{pages}{6} \endentry \entry{kernel_mei_hdcp}{online}{} \name{author}{1}{}{% {{hash=7801bf0ed827facf06b73af7e7edb095}{% family={Organization}, familyi={O\bibinitperiod}, given={Linux\bibnamedelima Kernel}, giveni={L\bibinitperiod\bibinitdelim K\bibinitperiod}}}% } \strng{namehash}{7801bf0ed827facf06b73af7e7edb095} \strng{fullhash}{7801bf0ed827facf06b73af7e7edb095} \strng{bibnamehash}{7801bf0ed827facf06b73af7e7edb095} \strng{authorbibnamehash}{7801bf0ed827facf06b73af7e7edb095} \strng{authornamehash}{7801bf0ed827facf06b73af7e7edb095} \strng{authorfullhash}{7801bf0ed827facf06b73af7e7edb095} \field{sortinit}{O} \field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{High-bandwidth Digital Content Protection (HDCP)} \field{year}{2020} \verb{urlraw} \verb https://www.kernel.org/doc/html//v5.8/driver-api/mei/hdcp.html \endverb \verb{url} \verb https://www.kernel.org/doc/html//v5.8/driver-api/mei/hdcp.html \endverb \endentry \entry{osdev_gop}{online}{} \name{author}{1}{}{% {{hash=2bd2931fac872535642e43e290f7d25b}{% family={{OSDev Wiki}}, familyi={O\bibinitperiod}}}% } \strng{namehash}{2bd2931fac872535642e43e290f7d25b} \strng{fullhash}{2bd2931fac872535642e43e290f7d25b} \strng{bibnamehash}{2bd2931fac872535642e43e290f7d25b} \strng{authorbibnamehash}{2bd2931fac872535642e43e290f7d25b} \strng{authornamehash}{2bd2931fac872535642e43e290f7d25b} \strng{authorfullhash}{2bd2931fac872535642e43e290f7d25b} \field{sortinit}{O} \field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Graphics Output Protocol (GOP)} \field{year}{2024} \verb{urlraw} \verb https://wiki.osdev.org/GOP \endverb \verb{url} \verb https://wiki.osdev.org/GOP \endverb \endentry \entry{osdev_uefi_memory}{misc}{} \name{author}{1}{}{% {{hash=981adb9ea98beb2d8a06e293991365f1}{% family={{OSDev Wiki contributors}}, familyi={O\bibinitperiod}}}% } \strng{namehash}{981adb9ea98beb2d8a06e293991365f1} \strng{fullhash}{981adb9ea98beb2d8a06e293991365f1} \strng{bibnamehash}{981adb9ea98beb2d8a06e293991365f1} \strng{authorbibnamehash}{981adb9ea98beb2d8a06e293991365f1} \strng{authornamehash}{981adb9ea98beb2d8a06e293991365f1} \strng{authorfullhash}{981adb9ea98beb2d8a06e293991365f1} \field{sortinit}{O} \field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 25-August-2024]} \field{title}{{UEFI - OSDev Wiki}} \field{year}{2024} \verb{urlraw} \verb https://wiki.osdev.org/UEFI#Memory \endverb \verb{url} \verb https://wiki.osdev.org/UEFI#Memory \endverb \endentry \entry{pearson2014}{inproceedings}{} \name{author}{1}{}{% {{hash=0cb7f02abd4eddb75a923fdbd4722b97}{% family={Pearson}, familyi={P\bibinitperiod}, given={Timothy}, giveni={T\bibinitperiod}}}% } \strng{namehash}{0cb7f02abd4eddb75a923fdbd4722b97} \strng{fullhash}{0cb7f02abd4eddb75a923fdbd4722b97} \strng{bibnamehash}{0cb7f02abd4eddb75a923fdbd4722b97} \strng{authorbibnamehash}{0cb7f02abd4eddb75a923fdbd4722b97} \strng{authornamehash}{0cb7f02abd4eddb75a923fdbd4722b97} \strng{authorfullhash}{0cb7f02abd4eddb75a923fdbd4722b97} \field{sortinit}{P} \field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{The World Beyond x86} \field{year}{2014} \true{nocite} \endentry \entry{acpi_programming}{manual}{} \name{author}{1}{}{% {{hash=30947d4473970fd63cd5dcb7c90a8e4a}{% family={Project}, familyi={P\bibinitperiod}, given={ACPICA}, giveni={A\bibinitperiod}}}% } \strng{namehash}{30947d4473970fd63cd5dcb7c90a8e4a} \strng{fullhash}{30947d4473970fd63cd5dcb7c90a8e4a} \strng{bibnamehash}{30947d4473970fd63cd5dcb7c90a8e4a} \strng{authorbibnamehash}{30947d4473970fd63cd5dcb7c90a8e4a} \strng{authornamehash}{30947d4473970fd63cd5dcb7c90a8e4a} \strng{authorfullhash}{30947d4473970fd63cd5dcb7c90a8e4a} \field{sortinit}{P} \field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-03} \field{title}{ACPI Component Architecture Programmer Reference} \field{year}{2017} \verb{urlraw} \verb https://acpica.org/documentation \endverb \verb{url} \verb https://acpica.org/documentation \endverb \endentry \entry{coreboot_docs}{manual}{} \name{author}{1}{}{% {{hash=ef0efcc19e2d35e9a880cf0cc2e05d7a}{% family={Project}, familyi={P\bibinitperiod}, prefix={coreboot}, prefixi={c\bibinitperiod}}}% } \strng{namehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a} \strng{fullhash}{ef0efcc19e2d35e9a880cf0cc2e05d7a} \strng{bibnamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a} \strng{authorbibnamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a} \strng{authornamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a} \strng{authorfullhash}{ef0efcc19e2d35e9a880cf0cc2e05d7a} \field{sortinit}{P} \field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{coreboot Documentation} \field{year}{2023} \verb{urlraw} \verb https://doc.coreboot.org/ \endverb \verb{url} \verb https://doc.coreboot.org/ \endverb \endentry \entry{coreboot_payloads}{misc}{} \name{author}{1}{}{% {{hash=22efab6c3f492e2d3e5ff09a274d19e3}{% family={project}, familyi={p\bibinitperiod}, prefix={coreboot}, prefixi={c\bibinitperiod}}}% } \strng{namehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{fullhash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{bibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{authorbibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{authornamehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{authorfullhash}{22efab6c3f492e2d3e5ff09a274d19e3} \field{extraname}{1} \field{sortinit}{p} \field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.coreboot.org/Payloads}} \field{note}{Accessed: 2024-07-23} \field{title}{coreboot Payloads} \endentry \entry{coreboot}{misc}{} \name{author}{1}{}{% {{hash=22efab6c3f492e2d3e5ff09a274d19e3}{% family={project}, familyi={p\bibinitperiod}, prefix={coreboot}, prefixi={c\bibinitperiod}}}% } \strng{namehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{fullhash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{bibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{authorbibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{authornamehash}{22efab6c3f492e2d3e5ff09a274d19e3} \strng{authorfullhash}{22efab6c3f492e2d3e5ff09a274d19e3} \field{extraname}{2} \field{sortinit}{p} \field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://www.coreboot.org/}} \field{note}{Accessed: 2024-07-23} \field{title}{coreboot: Open Source Firmware} \endentry \entry{raptor_engineering}{misc}{} \name{author}{1}{}{% {{hash=569ce67269d64596584ac37190233093}{% family={{Raptor Engineering LLC}}, familyi={R\bibinitperiod}}}% } \strng{namehash}{569ce67269d64596584ac37190233093} \strng{fullhash}{569ce67269d64596584ac37190233093} \strng{bibnamehash}{569ce67269d64596584ac37190233093} \strng{authorbibnamehash}{569ce67269d64596584ac37190233093} \strng{authornamehash}{569ce67269d64596584ac37190233093} \strng{authorfullhash}{569ce67269d64596584ac37190233093} \field{sortinit}{R} \field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 8-May-2024]} \field{title}{Raptor Engineering website} \field{year}{2009-2024} \verb{urlraw} \verb https://raptorengineering.com/ \endverb \verb{url} \verb https://raptorengineering.com/ \endverb \endentry \entry{reinauer2008coreboot}{inproceedings}{} \true{moreauthor} \true{morelabelname} \name{author}{1}{}{% {{hash=338aa5983567160bd6e7d5d77184578a}{% family={Reinauer}, familyi={R\bibinitperiod}, given={Stefan}, giveni={S\bibinitperiod}}}% } \strng{namehash}{87fc69411b96945ba4e4bc38d0a0f41b} \strng{fullhash}{87fc69411b96945ba4e4bc38d0a0f41b} \strng{bibnamehash}{87fc69411b96945ba4e4bc38d0a0f41b} \strng{authorbibnamehash}{87fc69411b96945ba4e4bc38d0a0f41b} \strng{authornamehash}{87fc69411b96945ba4e4bc38d0a0f41b} \strng{authorfullhash}{87fc69411b96945ba4e4bc38d0a0f41b} \field{sortinit}{R} \field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Usenix Annual Technical Conference} \field{title}{The coreboot Open Source BIOS - A Review} \field{year}{2008} \endentry \entry{richter2011bios}{inproceedings}{} \name{author}{4}{}{% {{hash=abb58308e6ee7df811f38441e9735701}{% family={Richter}, familyi={R\bibinitperiod}, given={Felix}, giveni={F\bibinitperiod}}}% {{hash=9df7b64d77a60e8340331f1ead58166c}{% family={Wressnegger}, familyi={W\bibinitperiod}, given={Christian}, giveni={C\bibinitperiod}}}% {{hash=409de46de24e2dbda2e942c5d80cb043}{% family={Schwenk}, familyi={S\bibinitperiod}, given={Thorsten}, giveni={T\bibinitperiod}}}% {{hash=ea36f719c6140abf47846202eb4673e0}{% family={Muller}, familyi={M\bibinitperiod}, given={Thorsten}, giveni={T\bibinitperiod}}}% } \strng{namehash}{8ca4cd3956658a3fde469908f7056e2d} \strng{fullhash}{5335382c4add8a538f3e649961f8d099} \strng{bibnamehash}{8ca4cd3956658a3fde469908f7056e2d} \strng{authorbibnamehash}{8ca4cd3956658a3fde469908f7056e2d} \strng{authornamehash}{8ca4cd3956658a3fde469908f7056e2d} \strng{authorfullhash}{5335382c4add8a538f3e649961f8d099} \field{sortinit}{R} \field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security} \field{title}{BIOS and UEFI firmware analysis} \field{year}{2011} \true{nocite} \field{pages}{7\bibrangedash 16} \range{pages}{10} \endentry \entry{rosenberg1994open}{book}{} \name{author}{1}{}{% {{hash=3fecee81a14fc53c8d7a0eb4baa7c3a4}{% family={Rosenberg}, familyi={R\bibinitperiod}, given={Ronald\bibnamedelima H}, giveni={R\bibinitperiod\bibinitdelim H\bibinitperiod}}}% } \list{publisher}{1}{% {IEEE Computer Society Press}% } \strng{namehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4} \strng{fullhash}{3fecee81a14fc53c8d7a0eb4baa7c3a4} \strng{bibnamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4} \strng{authorbibnamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4} \strng{authornamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4} \strng{authorfullhash}{3fecee81a14fc53c8d7a0eb4baa7c3a4} \field{sortinit}{R} \field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Open architecture computer systems} \field{year}{1994} \true{nocite} \endentry \entry{rudolph2007}{inproceedings}{} \name{author}{1}{}{% {{hash=9f897e096e6193a84feb0a5b0ca95d1e}{% family={Rudolph}, familyi={R\bibinitperiod}, given={M.}, giveni={M\bibinitperiod}}}% } \strng{namehash}{9f897e096e6193a84feb0a5b0ca95d1e} \strng{fullhash}{9f897e096e6193a84feb0a5b0ca95d1e} \strng{bibnamehash}{9f897e096e6193a84feb0a5b0ca95d1e} \strng{authorbibnamehash}{9f897e096e6193a84feb0a5b0ca95d1e} \strng{authornamehash}{9f897e096e6193a84feb0a5b0ca95d1e} \strng{authorfullhash}{9f897e096e6193a84feb0a5b0ca95d1e} \field{sortinit}{R} \field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{booktitle}{Proceedings of the Linux Symposium} \field{title}{LinuxBIOS: Open Source Boot Firmware} \field{year}{2007} \field{pages}{159\bibrangedash 167} \range{pages}{9} \verb{urlraw} \verb https://ols.fedoraproject.org/OLS/Reprints-2007/rudolph-Reprint.pdf \endverb \verb{url} \verb https://ols.fedoraproject.org/OLS/Reprints-2007/rudolph-Reprint.pdf \endverb \endentry \entry{russinovich2012}{book}{} \name{author}{3}{}{% {{hash=4c2da4e3b650f0a6bffc044b397680cc}{% family={Russinovich}, familyi={R\bibinitperiod}, given={M.\bibnamedelimi E.}, giveni={M\bibinitperiod\bibinitdelim E\bibinitperiod}}}% {{hash=749b374b1372bc938a228f56eced2d1a}{% family={Solomon}, familyi={S\bibinitperiod}, given={D.\bibnamedelimi A.}, giveni={D\bibinitperiod\bibinitdelim A\bibinitperiod}}}% {{hash=131b67d6604bc9d457955edcc178a127}{% family={Ionescu}, familyi={I\bibinitperiod}, given={A.}, giveni={A\bibinitperiod}}}% } \list{publisher}{1}{% {Microsoft Press}% } \strng{namehash}{cec07f798ad226261c1a84a121a934c0} \strng{fullhash}{cec07f798ad226261c1a84a121a934c0} \strng{bibnamehash}{cec07f798ad226261c1a84a121a934c0} \strng{authorbibnamehash}{cec07f798ad226261c1a84a121a934c0} \strng{authornamehash}{cec07f798ad226261c1a84a121a934c0} \strng{authorfullhash}{cec07f798ad226261c1a84a121a934c0} \field{sortinit}{R} \field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{edition}{6th} \field{title}{Windows Internals, Part 1} \field{year}{2012} \endentry \entry{anandtech_bulldozer}{article}{} \name{author}{1}{}{% {{hash=a2fcb5fbf9cbaac444753f21ef5733c6}{% family={Shimpi}, familyi={S\bibinitperiod}, given={Anand\bibnamedelima Lal}, giveni={A\bibinitperiod\bibinitdelim L\bibinitperiod}}}% } \strng{namehash}{a2fcb5fbf9cbaac444753f21ef5733c6} \strng{fullhash}{a2fcb5fbf9cbaac444753f21ef5733c6} \strng{bibnamehash}{a2fcb5fbf9cbaac444753f21ef5733c6} \strng{authorbibnamehash}{a2fcb5fbf9cbaac444753f21ef5733c6} \strng{authornamehash}{a2fcb5fbf9cbaac444753f21ef5733c6} \strng{authorfullhash}{a2fcb5fbf9cbaac444753f21ef5733c6} \field{sortinit}{S} \field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{AnandTech} \field{title}{The Bulldozer Review: AMD FX-8150 Tested} \field{year}{2011} \verb{urlraw} \verb https://www.anandtech.com/show/4955/the-bulldozer-review-amd-fx8150-tested \endverb \verb{url} \verb https://www.anandtech.com/show/4955/the-bulldozer-review-amd-fx8150-tested \endverb \endentry \entry{shin2011}{article}{} \name{author}{2}{}{% {{hash=8e68dee2d88f90cfacabb9608669b060}{% family={Shin}, familyi={S\bibinitperiod}, given={M.}, giveni={M\bibinitperiod}}}% {{hash=e57d0b1f72e19c844023fb5ae360f752}{% family={Lee}, familyi={L\bibinitperiod}, given={K.}, giveni={K\bibinitperiod}}}% } \strng{namehash}{c3f174f40fa786c163c984606bf2335a} \strng{fullhash}{c3f174f40fa786c163c984606bf2335a} \strng{bibnamehash}{c3f174f40fa786c163c984606bf2335a} \strng{authorbibnamehash}{c3f174f40fa786c163c984606bf2335a} \strng{authornamehash}{c3f174f40fa786c163c984606bf2335a} \strng{authorfullhash}{c3f174f40fa786c163c984606bf2335a} \field{sortinit}{S} \field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Journal of Computer Science and Technology} \field{number}{2} \field{title}{Design and Implementation of a UEFI-Compliant Firmware Platform} \field{volume}{26} \field{year}{2011} \field{pages}{219\bibrangedash 230} \range{pages}{12} \verb{doi} \verb 10.1007/s11390-011-0121-8 \endverb \endentry \entry{shustek2016kildall}{misc}{} \name{author}{1}{}{% {{hash=c26de56d0912649a64854ccba2dbc8e1}{% family={Shustek}, familyi={S\bibinitperiod}, given={Leonard\bibnamedelima J.}, giveni={L\bibinitperiod\bibinitdelim J\bibinitperiod}}}% } \strng{namehash}{c26de56d0912649a64854ccba2dbc8e1} \strng{fullhash}{c26de56d0912649a64854ccba2dbc8e1} \strng{bibnamehash}{c26de56d0912649a64854ccba2dbc8e1} \strng{authorbibnamehash}{c26de56d0912649a64854ccba2dbc8e1} \strng{authornamehash}{c26de56d0912649a64854ccba2dbc8e1} \strng{authorfullhash}{c26de56d0912649a64854ccba2dbc8e1} \field{sortinit}{S} \field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{Computer History Museum Blog} \field{note}{Accessed: August 16, 2024} \field{title}{In His Own Words: Gary Kildall} \field{year}{2016} \verb{urlraw} \verb https://computerhistory.org/blog/in-his-own-words-gary-kildall/ \endverb \verb{url} \verb https://computerhistory.org/blog/in-his-own-words-gary-kildall/ \endverb \endentry \entry{smith2019firmware}{article}{} \name{author}{2}{}{% {{hash=5dae92275f3afda5b0b3da88efb93844}{% family={Smith}, familyi={S\bibinitperiod}, given={David}, giveni={D\bibinitperiod}}}% {{hash=33ff2635eacd261b8950b0f1757d5b51}{% family={Chen}, familyi={C\bibinitperiod}, given={Alice}, giveni={A\bibinitperiod}}}% } \strng{namehash}{a5e489f30a1acc2419b54d463c229491} \strng{fullhash}{a5e489f30a1acc2419b54d463c229491} \strng{bibnamehash}{a5e489f30a1acc2419b54d463c229491} \strng{authorbibnamehash}{a5e489f30a1acc2419b54d463c229491} \strng{authornamehash}{a5e489f30a1acc2419b54d463c229491} \strng{authorfullhash}{a5e489f30a1acc2419b54d463c229491} \field{sortinit}{S} \field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Computer Security Review} \field{number}{4} \field{title}{Firmware as the New Hypervisor: A Virtualized Perspective} \field{volume}{27} \field{year}{2019} \field{pages}{210\bibrangedash 225} \range{pages}{16} \endentry \entry{ast2050_kvm}{article}{} \name{author}{1}{}{% {{hash=5d0ddda3a367ceb26fbaeca02e391c22}{% family={Smith}, familyi={S\bibinitperiod}, given={John}, giveni={J\bibinitperiod}}}% } \list{publisher}{1}{% {Tech Press}% } \strng{namehash}{5d0ddda3a367ceb26fbaeca02e391c22} \strng{fullhash}{5d0ddda3a367ceb26fbaeca02e391c22} \strng{bibnamehash}{5d0ddda3a367ceb26fbaeca02e391c22} \strng{authorbibnamehash}{5d0ddda3a367ceb26fbaeca02e391c22} \strng{authornamehash}{5d0ddda3a367ceb26fbaeca02e391c22} \strng{authorfullhash}{5d0ddda3a367ceb26fbaeca02e391c22} \field{sortinit}{S} \field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{Journal of Embedded Computing} \field{number}{3} \field{title}{Remote KVM-over-IP on the ASpeed AST2050} \field{volume}{14} \field{year}{2014} \field{pages}{45\bibrangedash 49} \range{pages}{5} \endentry \entry{SridharanVilas2015MEiM}{article}{} \name{author}{7}{}{% {{hash=424e5d7c7305b93eade0897c378a833a}{% family={Sridharan}, familyi={S\bibinitperiod}, given={Vilas}, giveni={V\bibinitperiod}}}% {{hash=7dcd293f0266c03f1b274f6e49a7fd99}{% family={DeBardeleben}, familyi={D\bibinitperiod}, given={Nathan}, giveni={N\bibinitperiod}}}% {{hash=709868da6f9c5c23f722f4b7c0a473f4}{% family={Blanchard}, familyi={B\bibinitperiod}, given={Sean}, giveni={S\bibinitperiod}}}% {{hash=cbc6e783519df8ff0de6b6631442319a}{% family={Ferreira}, familyi={F\bibinitperiod}, given={Kurt\bibnamedelima B.}, giveni={K\bibinitperiod\bibinitdelim B\bibinitperiod}}}% {{hash=18ca07e0da61f3be699c8003f4ee93b4}{% family={Stearley}, familyi={S\bibinitperiod}, given={Jon}, giveni={J\bibinitperiod}}}% {{hash=8411e32c5282692ec8fb33ae8efc7b3a}{% family={Shalf}, familyi={S\bibinitperiod}, given={John}, giveni={J\bibinitperiod}}}% {{hash=370b98113e6d3786aca18de5ef4a72ff}{% family={Gurumurthi}, familyi={G\bibinitperiod}, given={Sudhanva}, giveni={S\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \strng{namehash}{aeb9446378538df625b4820c6fa03b69} \strng{fullhash}{175a0847e434ba3d53ed4787fd09be05} \strng{bibnamehash}{aeb9446378538df625b4820c6fa03b69} \strng{authorbibnamehash}{aeb9446378538df625b4820c6fa03b69} \strng{authornamehash}{aeb9446378538df625b4820c6fa03b69} \strng{authorfullhash}{175a0847e434ba3d53ed4787fd09be05} \field{sortinit}{S} \field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{0163-5964} \field{journaltitle}{Computer architecture news} \field{number}{1} \field{title}{Memory Errors in Modern Systems: The Good, The Bad, and The Ugly} \field{volume}{43} \field{year}{2015} \field{pages}{297\bibrangedash 310} \range{pages}{14} \endentry \entry{ast2050_architecture}{article}{} \name{author}{1}{}{% {{hash=5724d534bba82cf4cced0784f7ce038b}{% family={Technology}, familyi={T\bibinitperiod}, given={ASpeed}, giveni={A\bibinitperiod}}}% } \strng{namehash}{5724d534bba82cf4cced0784f7ce038b} \strng{fullhash}{5724d534bba82cf4cced0784f7ce038b} \strng{bibnamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authorbibnamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authornamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authorfullhash}{5724d534bba82cf4cced0784f7ce038b} \field{extraname}{1} \field{sortinit}{T} \field{sortinithash}{9af77f0292593c26bde9a56e688eaee9} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{ASpeed Whitepaper} \field{note}{Accessed: 2024-08-21} \field{title}{ASpeed AST2050: ARM926EJ-S Based BMC Architecture} \field{year}{2013} \verb{urlraw} \verb https://www.aspeedtech.com/products.php?fPath=20&rId=29 \endverb \verb{url} \verb https://www.aspeedtech.com/products.php?fPath=20&rId=29 \endverb \endentry \entry{ast2050_nic}{manual}{} \name{author}{1}{}{% {{hash=5724d534bba82cf4cced0784f7ce038b}{% family={Technology}, familyi={T\bibinitperiod}, given={ASpeed}, giveni={A\bibinitperiod}}}% } \strng{namehash}{5724d534bba82cf4cced0784f7ce038b} \strng{fullhash}{5724d534bba82cf4cced0784f7ce038b} \strng{bibnamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authorbibnamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authornamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authorfullhash}{5724d534bba82cf4cced0784f7ce038b} \field{extraname}{2} \field{sortinit}{T} \field{sortinithash}{9af77f0292593c26bde9a56e688eaee9} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-21} \field{title}{ASpeed AST2050: Network Interface Controller for BMC} \field{year}{2013} \verb{urlraw} \verb https://www.aspeedtech.com/products.php?fPath=20&rId=29 \endverb \verb{url} \verb https://www.aspeedtech.com/products.php?fPath=20&rId=29 \endverb \endentry \entry{ast2050_io}{manual}{} \name{author}{1}{}{% {{hash=5724d534bba82cf4cced0784f7ce038b}{% family={Technology}, familyi={T\bibinitperiod}, given={ASpeed}, giveni={A\bibinitperiod}}}% } \strng{namehash}{5724d534bba82cf4cced0784f7ce038b} \strng{fullhash}{5724d534bba82cf4cced0784f7ce038b} \strng{bibnamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authorbibnamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authornamehash}{5724d534bba82cf4cced0784f7ce038b} \strng{authorfullhash}{5724d534bba82cf4cced0784f7ce038b} \field{extraname}{3} \field{sortinit}{T} \field{sortinithash}{9af77f0292593c26bde9a56e688eaee9} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-21} \field{title}{I/O Interfaces of the ASpeed AST2050} \field{year}{2013} \verb{urlraw} \verb https://www.aspeedtech.com/products.php?fPath=20&rId=29 \endverb \verb{url} \verb https://www.aspeedtech.com/products.php?fPath=20&rId=29 \endverb \endentry \entry{tianocore_payload}{manual}{} \name{author}{1}{}{% {{hash=632f06b41d4b1b901fc37d1cf32e810f}{% family={{TianoCore Project}}, familyi={T\bibinitperiod}}}% } \strng{namehash}{632f06b41d4b1b901fc37d1cf32e810f} \strng{fullhash}{632f06b41d4b1b901fc37d1cf32e810f} \strng{bibnamehash}{632f06b41d4b1b901fc37d1cf32e810f} \strng{authorbibnamehash}{632f06b41d4b1b901fc37d1cf32e810f} \strng{authornamehash}{632f06b41d4b1b901fc37d1cf32e810f} \strng{authorfullhash}{632f06b41d4b1b901fc37d1cf32e810f} \field{sortinit}{T} \field{sortinithash}{9af77f0292593c26bde9a56e688eaee9} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{TianoCore as a Coreboot Payload} \field{year}{2024} \verb{urlraw} \verb https://doc.coreboot.org/payloads/tianocore.html \endverb \verb{url} \verb https://doc.coreboot.org/payloads/tianocore.html \endverb \endentry \entry{uefi_what_is_uefi}{manual}{} \name{author}{1}{}{% {{hash=018a60b8cb2aa8763314c4672515eee5}{% family={{UEFI Forum}}, familyi={U\bibinitperiod}}}% } \strng{namehash}{018a60b8cb2aa8763314c4672515eee5} \strng{fullhash}{018a60b8cb2aa8763314c4672515eee5} \strng{bibnamehash}{018a60b8cb2aa8763314c4672515eee5} \strng{authorbibnamehash}{018a60b8cb2aa8763314c4672515eee5} \strng{authornamehash}{018a60b8cb2aa8763314c4672515eee5} \strng{authorfullhash}{018a60b8cb2aa8763314c4672515eee5} \field{sortinit}{U} \field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{What is UEFI?} \field{year}{2023} \verb{urlraw} \verb https://uefi.org/sites/default/files/resources/What%20is%20UEFI-Aug31-2023-Final.pdf \endverb \verb{url} \verb https://uefi.org/sites/default/files/resources/What%20is%20UEFI-Aug31-2023-Final.pdf \endverb \endentry \entry{lip6_annuaire}{misc}{} \name{author}{1}{}{% {{hash=a220fc1da6562fa2e1e0bc05c201b485}{% family={Université/CNRS}, familyi={U\bibinitperiod}, given={Sorbonne}, giveni={S\bibinitperiod}}}% } \strng{namehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{fullhash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{bibnamehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{authorbibnamehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{authornamehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{authorfullhash}{a220fc1da6562fa2e1e0bc05c201b485} \field{extraname}{1} \field{sortinit}{U} \field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{Annuaire LIP6} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://www.lip6.fr/recherche/resultat.php?keyword=&find=Rechercher+au+LIP6 \endverb \verb{url} \verb https://www.lip6.fr/recherche/resultat.php?keyword=&find=Rechercher+au+LIP6 \endverb \endentry \entry{lip6_web}{misc}{} \name{author}{1}{}{% {{hash=a220fc1da6562fa2e1e0bc05c201b485}{% family={Université/CNRS}, familyi={U\bibinitperiod}, given={Sorbonne}, giveni={S\bibinitperiod}}}% } \strng{namehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{fullhash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{bibnamehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{authorbibnamehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{authornamehash}{a220fc1da6562fa2e1e0bc05c201b485} \strng{authorfullhash}{a220fc1da6562fa2e1e0bc05c201b485} \field{extraname}{2} \field{sortinit}{U} \field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{Laboratoire d'Informatique de Paris 6} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://www.lip6.fr/ \endverb \verb{url} \verb https://www.lip6.fr/ \endverb \endentry \entry{coreboot_fsf}{inproceedings}{} \name{author}{1}{}{% {{hash=af41616b6f1e8e444fcc49b61089d90f}{% family={Vandewege}, familyi={V\bibinitperiod}, given={Ward}, giveni={W\bibinitperiod}}}% } \strng{namehash}{af41616b6f1e8e444fcc49b61089d90f} \strng{fullhash}{af41616b6f1e8e444fcc49b61089d90f} \strng{bibnamehash}{af41616b6f1e8e444fcc49b61089d90f} \strng{authorbibnamehash}{af41616b6f1e8e444fcc49b61089d90f} \strng{authornamehash}{af41616b6f1e8e444fcc49b61089d90f} \strng{authorfullhash}{af41616b6f1e8e444fcc49b61089d90f} \field{sortinit}{V} \field{sortinithash}{afb52128e5b4dc4b843768c0113d673b} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{title}{Coreboot: the view from the FSF} \field{year}{2008} \endentry \entry{VersenM.2020Rhaa}{article}{} \name{author}{2}{}{% {{hash=c442b1f2c144f99fa527ef0ae0e89787}{% family={Versen}, familyi={V\bibinitperiod}, given={M.}, giveni={M\bibinitperiod}}}% {{hash=6571a9fefd8cd260223347a23bfaf144}{% family={Ernst}, familyi={E\bibinitperiod}, given={W.}, giveni={W\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{publisher}{1}{% {Elsevier Ltd}% } \strng{namehash}{190c742d46641dc9848cc3e17eb1b3ce} \strng{fullhash}{190c742d46641dc9848cc3e17eb1b3ce} \strng{bibnamehash}{190c742d46641dc9848cc3e17eb1b3ce} \strng{authorbibnamehash}{190c742d46641dc9848cc3e17eb1b3ce} \strng{authornamehash}{190c742d46641dc9848cc3e17eb1b3ce} \strng{authorfullhash}{190c742d46641dc9848cc3e17eb1b3ce} \field{sortinit}{V} \field{sortinithash}{afb52128e5b4dc4b843768c0113d673b} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{0026-2714} \field{journaltitle}{Microelectronics and reliability} \field{title}{Row hammer avoidance analysis of DDR3 SDRAM} \field{volume}{114} \field{year}{2020} \true{nocite} \field{pages}{113744\bibrangedash} \range{pages}{-1} \endentry \entry{vikings}{misc}{} \name{author}{1}{}{% {{hash=a151e054e930181c6173dc5edbf4d8e3}{% family={{Vikings GmbH}}, familyi={V\bibinitperiod}}}% } \strng{namehash}{a151e054e930181c6173dc5edbf4d8e3} \strng{fullhash}{a151e054e930181c6173dc5edbf4d8e3} \strng{bibnamehash}{a151e054e930181c6173dc5edbf4d8e3} \strng{authorbibnamehash}{a151e054e930181c6173dc5edbf4d8e3} \strng{authornamehash}{a151e054e930181c6173dc5edbf4d8e3} \strng{authorfullhash}{a151e054e930181c6173dc5edbf4d8e3} \field{sortinit}{V} \field{sortinithash}{afb52128e5b4dc4b843768c0113d673b} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{Vikings Hardware Recommendations for KGPE-D16} \verb{urlraw} \verb https://wiki.vikings.net/KGPE-D16 \endverb \verb{url} \verb https://wiki.vikings.net/KGPE-D16 \endverb \endentry \entry{WangDong2019AIUb}{article}{} \name{author}{2}{}{% {{hash=4695c12fc5e5638d83abfb67ab9d459c}{% family={Wang}, familyi={W\bibinitperiod}, given={Dong}, giveni={D\bibinitperiod}}}% {{hash=1aac09ee1dcf318e0166bf96fdf3add8}{% family={Dong}, familyi={D\bibinitperiod}, given={Wei\bibnamedelima Yu}, giveni={W\bibinitperiod\bibinitdelim Y\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{location}{1}{% {Bristol}% } \list{publisher}{1}{% {IOP Publishing}% } \strng{namehash}{f8e60a7e98273f88ed342577bd994ac5} \strng{fullhash}{f8e60a7e98273f88ed342577bd994ac5} \strng{bibnamehash}{f8e60a7e98273f88ed342577bd994ac5} \strng{authorbibnamehash}{f8e60a7e98273f88ed342577bd994ac5} \strng{authornamehash}{f8e60a7e98273f88ed342577bd994ac5} \strng{authorfullhash}{f8e60a7e98273f88ed342577bd994ac5} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{1742-6588} \field{journaltitle}{Journal of physics. Conference series} \field{number}{4} \field{title}{Attacking Intel UEFI by Using Cache Poisoning} \field{volume}{1187} \field{year}{2019} \true{nocite} \field{pages}{42072\bibrangedash} \range{pages}{-1} \keyw{Alliances ; Integrated circuits ; Poisoning} \endentry \entry{WaqarMuhammad2021DDCF}{article}{} \name{author}{4}{}{% {{hash=ee5704d66d59e3cff0ccd7340680b3cb}{% family={Waqar}, familyi={W\bibinitperiod}, given={Muhammad}, giveni={M\bibinitperiod}}}% {{hash=394c7290cf8ce4e9e957f8b00086ad41}{% family={Bak}, familyi={B\bibinitperiod}, given={Geunyong}, giveni={G\bibinitperiod}}}% {{hash=1f079894ae531411ed1de72354831c91}{% family={Kwon}, familyi={K\bibinitperiod}, given={Junhyeong}, giveni={J\bibinitperiod}}}% {{hash=5b2467e0abbadb6813f15043a1171386}{% family={Baeg}, familyi={B\bibinitperiod}, given={Sanghyeon}, giveni={S\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{location}{1}{% {Piscataway}% } \list{publisher}{1}{% {IEEE}% } \strng{namehash}{0bdeb802bff85655b14b4864aea757ce} \strng{fullhash}{eaa8d50f0a408c25fab46e0a4aafbb9f} \strng{bibnamehash}{0bdeb802bff85655b14b4864aea757ce} \strng{authorbibnamehash}{0bdeb802bff85655b14b4864aea757ce} \strng{authornamehash}{0bdeb802bff85655b14b4864aea757ce} \strng{authorfullhash}{eaa8d50f0a408c25fab46e0a4aafbb9f} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{2169-3536} \field{journaltitle}{IEEE access} \field{title}{DDR4 Data Channel Failure Due to DC Offset Caused by Intermittent Solder Ball Fracture in FBGA Package} \field{volume}{9} \field{year}{2021} \true{nocite} \field{pages}{63002\bibrangedash 63011} \range{pages}{10} \keyw{Capacitors ; Couplings ; Printed circuits} \endentry \entry{AGESA_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{1} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 8-May-2024]} \field{title}{AGESA --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2023} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=AGESA&oldid=1166805057 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=AGESA&oldid=1166805057 \endverb \endentry \entry{psp_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{2} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{AMD Platform Security Processor --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=AMD_Platform_Security_Processor&oldid=1216563013 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=AMD_Platform_Security_Processor&oldid=1216563013 \endverb \endentry \entry{wiki_bios}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{3} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=BIOS&oldid=1240397019}} \field{note}{[Online; accessed 16-August-2024]} \field{title}{BIOS --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \endentry \entry{DDR3_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{4} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 8-May-2024]} \field{title}{DDR3 SDRAM --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=DDR3_SDRAM&oldid=1207641521 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=DDR3_SDRAM&oldid=1207641521 \endverb \endentry \entry{free_soft_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{5} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 30-January-2024]} \field{title}{Free software --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=Free_software&oldid=1196006316 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=Free_software&oldid=1196006316 \endverb \endentry \entry{fsf_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{6} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{Free Software Foundation --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=Free_Software_Foundation&oldid=1222269091 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=Free_Software_Foundation&oldid=1222269091 \endverb \endentry \entry{fs_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{7} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 29-January-2024]} \field{title}{Free software movement --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=Free_software_movement&oldid=1197710495 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=Free_software_movement&oldid=1197710495 \endverb \endentry \entry{gfdl_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{8} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 30-January-2024]} \field{title}{GNU Free Documentation License --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=GNU_Free_Documentation_License&oldid=1193649968 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=GNU_Free_Documentation_License&oldid=1193649968 \endverb \endentry \entry{gpl_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{9} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 30-January-2024]} \field{title}{GNU General Public License --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=GNU_General_Public_License&oldid=1199241605 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=GNU_General_Public_License&oldid=1199241605 \endverb \endentry \entry{grub_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{10} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{GNU GRUB --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=GNU_GRUB&oldid=1217643156 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=GNU_GRUB&oldid=1217643156 \endverb \endentry \entry{gnu_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{11} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{GNU Project --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=GNU_Project&oldid=1205139455 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=GNU_Project&oldid=1205139455 \endverb \endentry \entry{ime_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{12} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{Intel Management Engine --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=1216703991 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=1216703991 \endverb \endentry \entry{lip6_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{13} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{Laboratoire d'Informatique de Paris 6 --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=Laboratoire_d%27Informatique_de_Paris_6&oldid=1222525180 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=Laboratoire_d%27Informatique_de_Paris_6&oldid=1222525180 \endverb \endentry \entry{NDA_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{14} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 8-May-2024]} \field{title}{Non-disclosure agreement --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2023} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=Non-disclosure_agreement&oldid=1183749255 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=Non-disclosure_agreement&oldid=1183749255 \endverb \endentry \entry{northbridge_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{15} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=Northbridge_(computing)&oldid=1231509957}} \field{note}{[Online; accessed 17-August-2024]} \field{title}{Northbridge (computing) --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \endentry \entry{openbmc_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{16} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 8-May-2024]} \field{title}{OpenBMC --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2023} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=OpenBMC&oldid=1183698628 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=OpenBMC&oldid=1183698628 \endverb \endentry \entry{seabios_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{17} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{SeaBIOS --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2023} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=SeaBIOS&oldid=1179465237 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=SeaBIOS&oldid=1179465237 \endverb \endentry \entry{southbridge_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{18} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=Southbridge_(computing)&oldid=1239483618}} \field{note}{[Online; accessed 17-August-2024]} \field{title}{Southbridge (computing) --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \endentry \entry{4freedom_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{19} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 29-January-2024]} \field{title}{The Free Software Definition --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2023} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=The_Free_Software_Definition&oldid=1192713194 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=The_Free_Software_Definition&oldid=1192713194 \endverb \endentry \entry{osd_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{20} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 30-January-2024]} \field{title}{The Open Source Definition --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2023} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=The_Open_Source_Definition&oldid=1191447775 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=The_Open_Source_Definition&oldid=1191447775 \endverb \endentry \entry{x86_wiki}{misc}{} \name{author}{1}{}{% {{hash=b6aea1a416c89509a7df1cbb69249cb6}{% family={{Wikipedia contributors}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6} \strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6} \field{extraname}{21} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{[Online; accessed 7-May-2024]} \field{title}{X86 --- {Wikipedia}{,} The Free Encyclopedia} \field{year}{2024} \true{nocite} \verb{urlraw} \verb https://en.wikipedia.org/w/index.php?title=X86&oldid=1221800539 \endverb \verb{url} \verb https://en.wikipedia.org/w/index.php?title=X86&oldid=1221800539 \endverb \endentry \entry{winbond}{manual}{} \name{author}{1}{}{% {{hash=506790477fe03844712a0c66579f17d0}{% family={{Winbond Electronics Corporation}}, familyi={W\bibinitperiod}}}% } \strng{namehash}{506790477fe03844712a0c66579f17d0} \strng{fullhash}{506790477fe03844712a0c66579f17d0} \strng{bibnamehash}{506790477fe03844712a0c66579f17d0} \strng{authorbibnamehash}{506790477fe03844712a0c66579f17d0} \strng{authornamehash}{506790477fe03844712a0c66579f17d0} \strng{authorfullhash}{506790477fe03844712a0c66579f17d0} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{note}{Accessed: 2024-08-17} \field{title}{WINBOND W83667HG-A Datasheet} \verb{urlraw} \verb https://www.winbond.com/ \endverb \verb{url} \verb https://www.winbond.com/ \endverb \endentry \entry{wolf2006}{article}{} \name{author}{1}{}{% {{hash=e7ea35f3f0c3cf77495520fc0d8fdb22}{% family={Wolf}, familyi={W\bibinitperiod}, given={K.}, giveni={K\bibinitperiod}}}% } \strng{namehash}{e7ea35f3f0c3cf77495520fc0d8fdb22} \strng{fullhash}{e7ea35f3f0c3cf77495520fc0d8fdb22} \strng{bibnamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22} \strng{authorbibnamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22} \strng{authornamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22} \strng{authorfullhash}{e7ea35f3f0c3cf77495520fc0d8fdb22} \field{sortinit}{W} \field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{journaltitle}{IEEE Computer Society} \field{number}{5} \field{title}{Modern Boot Firmware: Moving from BIOS to UEFI} \field{volume}{39} \field{year}{2006} \true{nocite} \field{pages}{42\bibrangedash 47} \range{pages}{6} \verb{doi} \verb 10.1109/MC.2006.156 \endverb \endentry \entry{YiJinhui2021DoDS}{article}{} \name{author}{3}{}{% {{hash=a738e2c330fa8bb553322676f86cdd67}{% family={Yi}, familyi={Y\bibinitperiod}, given={Jinhui}, giveni={J\bibinitperiod}}}% {{hash=1ec6f5d17a25af4f2091741966c18325}{% family={Wang}, familyi={W\bibinitperiod}, given={Mingfu}, giveni={M\bibinitperiod}}}% {{hash=90c8def289747c02c6ba0fa10c44c4d4}{% family={Bai}, familyi={B\bibinitperiod}, given={Lidong}, giveni={L\bibinitperiod}}}% } \list{language}{1}{% {eng}% } \list{location}{1}{% {Bristol}% } \list{publisher}{1}{% {IOP Publishing}% } \strng{namehash}{f0fa6bd8023def40891dba2f4d00ecb2} \strng{fullhash}{f0fa6bd8023def40891dba2f4d00ecb2} \strng{bibnamehash}{f0fa6bd8023def40891dba2f4d00ecb2} \strng{authorbibnamehash}{f0fa6bd8023def40891dba2f4d00ecb2} \strng{authornamehash}{f0fa6bd8023def40891dba2f4d00ecb2} \strng{authorfullhash}{f0fa6bd8023def40891dba2f4d00ecb2} \field{sortinit}{Y} \field{sortinithash}{fd67ad5a9ef0f7456bdd9aab10fe1495} \field{labelnamesource}{author} \field{labeltitlesource}{title} \field{issn}{1742-6588} \field{journaltitle}{Journal of physics. Conference series} \field{number}{1} \field{title}{Design of DDR3 SDRAM read-write controller based on FPGA} \field{volume}{1846} \field{year}{2021} \true{nocite} \field{pages}{12046\bibrangedash} \range{pages}{-1} \keyw{Cameras ; Optical fibers ; Physics ; Realtime . . .} \endentry \enddatalist \endrefsection \endinput