4198 lines
167 KiB
Plaintext
4198 lines
167 KiB
Plaintext
% $ biblatex auxiliary file $
|
||
% $ biblatex bbl format version 3.2 $
|
||
% Do not modify the above lines!
|
||
%
|
||
% This is an auxiliary file used by the 'biblatex' package.
|
||
% This file may safely be deleted. It will be recreated by
|
||
% biber as required.
|
||
%
|
||
\begingroup
|
||
\makeatletter
|
||
\@ifundefined{ver@biblatex.sty}
|
||
{\@latex@error
|
||
{Missing 'biblatex' package}
|
||
{The bibliography requires the 'biblatex' package.}
|
||
\aftergroup\endinput}
|
||
{}
|
||
\endgroup
|
||
|
||
|
||
\refsection{0}
|
||
\datalist[entry]{nty/global//global/global}
|
||
\entry{Abraham1983}{inproceedings}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=145a88e2c450d43e758fabba735f6b2b}{%
|
||
family={Abraham},
|
||
familyi={A\bibinitperiod},
|
||
given={J.A.},
|
||
giveni={J\bibinitperiod}}}%
|
||
{{hash=41601f087622b21f9a4a945ff2992e15}{%
|
||
family={Breuer},
|
||
familyi={B\bibinitperiod},
|
||
given={M.A.},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{ACM}%
|
||
}
|
||
\strng{namehash}{30178f517a17fa3a49a1ee29837ca525}
|
||
\strng{fullhash}{30178f517a17fa3a49a1ee29837ca525}
|
||
\strng{bibnamehash}{30178f517a17fa3a49a1ee29837ca525}
|
||
\strng{authorbibnamehash}{30178f517a17fa3a49a1ee29837ca525}
|
||
\strng{authornamehash}{30178f517a17fa3a49a1ee29837ca525}
|
||
\strng{authorfullhash}{30178f517a17fa3a49a1ee29837ca525}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Proceedings of the 10th Annual International Symposium on Computer Architecture}
|
||
\field{title}{A Study of Redundant Logic in Microprocessors}
|
||
\field{year}{1983}
|
||
\field{pages}{116\bibrangedash 126}
|
||
\range{pages}{11}
|
||
\endentry
|
||
\entry{acmcs2015}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=dd350c00debd90eb907e07a437681ea9}{%
|
||
family={ACMCS},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{dd350c00debd90eb907e07a437681ea9}
|
||
\strng{fullhash}{dd350c00debd90eb907e07a437681ea9}
|
||
\strng{bibnamehash}{dd350c00debd90eb907e07a437681ea9}
|
||
\strng{authorbibnamehash}{dd350c00debd90eb907e07a437681ea9}
|
||
\strng{authornamehash}{dd350c00debd90eb907e07a437681ea9}
|
||
\strng{authorfullhash}{dd350c00debd90eb907e07a437681ea9}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{ACM Computing Surveys}
|
||
\field{number}{4}
|
||
\field{title}{The Evolution of Firmware: BIOS to UEFI}
|
||
\field{volume}{47}
|
||
\field{year}{2015}
|
||
\field{pages}{55\bibrangedash 61}
|
||
\range{pages}{7}
|
||
\verb{doi}
|
||
\verb 10.1145/2766462
|
||
\endverb
|
||
\endentry
|
||
\entry{amd_bsp}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=ec549314e642f60d59af16514cec0835}{%
|
||
family={{Advanced Micro Devices (AMD)}},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{fullhash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{bibnamehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{authorbibnamehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{authornamehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{authorfullhash}{ec549314e642f60d59af16514cec0835}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{AMD Family 15h Models 30h-3Fh Processors BIOS and Kernel Developer's Guide}
|
||
\field{year}{2014}
|
||
\verb{urlraw}
|
||
\verb https://www.amd.com/system/files/TechDocs/48751_15h_Mod_30h-3Fh_BKDG.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.amd.com/system/files/TechDocs/48751_15h_Mod_30h-3Fh_BKDG.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{amd_chipsets}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=ec549314e642f60d59af16514cec0835}{%
|
||
family={{Advanced Micro Devices (AMD)}},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{fullhash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{bibnamehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{authorbibnamehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{authornamehash}{ec549314e642f60d59af16514cec0835}
|
||
\strng{authorfullhash}{ec549314e642f60d59af16514cec0835}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{AMD SR5690 Databook}
|
||
\verb{urlraw}
|
||
\verb https://www.amd.com/content/dam/amd/en/documents/archived-tech-docs/datasheets/43869.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.amd.com/content/dam/amd/en/documents/archived-tech-docs/datasheets/43869.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{altera2008}{inproceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=3eb79c14c66a46e93a0deec7cb61c135}{%
|
||
family={Altera®},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{3eb79c14c66a46e93a0deec7cb61c135}
|
||
\strng{fullhash}{3eb79c14c66a46e93a0deec7cb61c135}
|
||
\strng{bibnamehash}{3eb79c14c66a46e93a0deec7cb61c135}
|
||
\strng{authorbibnamehash}{3eb79c14c66a46e93a0deec7cb61c135}
|
||
\strng{authornamehash}{3eb79c14c66a46e93a0deec7cb61c135}
|
||
\strng{authorfullhash}{3eb79c14c66a46e93a0deec7cb61c135}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{number}{AN-520-1.0}
|
||
\field{title}{DDR3 SDRAM Memory Interface Termination and Layout Guidelines}
|
||
\field{year}{2008}
|
||
\endentry
|
||
\entry{amd_ddr3_guide}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={{AMD}},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Available at AMD Developer Central}
|
||
\field{title}{AMD DDR3 Memory Controller: Technical Overview}
|
||
\field{year}{2011}
|
||
\verb{urlraw}
|
||
\verb https://developer.amd.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://developer.amd.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{amd_6200}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={{AMD}},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Available at AMD Developer Central}
|
||
\field{title}{AMD Opteron 6200 Series Processor}
|
||
\field{year}{2011}
|
||
\verb{urlraw}
|
||
\verb https://developer.amd.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://developer.amd.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{BKDG}{inbook}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={AMD},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Advanced Micro Devices, Inc.}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{01}
|
||
\field{number}{42301}
|
||
\field{title}{BIOS and Kernel Developer’s Guide (BKDG) for AMD Family 15h Models 00h-0Fh Processors Rev 3.14}
|
||
\field{year}{2013}
|
||
\endentry
|
||
\entry{amd_ht_guide}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={{AMD}},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{4}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Available at AMD Developer Central}
|
||
\field{title}{HyperTransport Technology: Technical Overview}
|
||
\field{year}{2011}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://developer.amd.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://developer.amd.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{amd_fam15h_revision_guide}{report}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={AMD},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{Advanced Micro Devices, Inc.}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{5}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{05}
|
||
\field{number}{48931}
|
||
\field{title}{Revision Guide for AMD Family 15h Models 00h-0Fh Rev 3.10}
|
||
\field{type}{techreport}
|
||
\field{year}{2013}
|
||
\endentry
|
||
\entry{SR5690BDG}{inbook}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={AMD},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{6}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{11}
|
||
\field{number}{43870}
|
||
\field{title}{SR5690/5670/5650 BIOS Developer’s Guide 3.00}
|
||
\field{year}{2010}
|
||
\endentry
|
||
\entry{SR5690RPR}{inbook}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=48af4341f745163f945fa838eeabb062}{%
|
||
family={AMD},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
|
||
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
|
||
\field{extraname}{7}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{08}
|
||
\field{number}{43872}
|
||
\field{title}{SR5690/5670/5650 Register Programming Requirements 3.05}
|
||
\field{year}{2012}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{ibm_pc}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=f374c5f07cf19169f9b9d346dd5dc48b}{%
|
||
family={Archives},
|
||
familyi={A\bibinitperiod},
|
||
given={IBM},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{f374c5f07cf19169f9b9d346dd5dc48b}
|
||
\strng{fullhash}{f374c5f07cf19169f9b9d346dd5dc48b}
|
||
\strng{bibnamehash}{f374c5f07cf19169f9b9d346dd5dc48b}
|
||
\strng{authorbibnamehash}{f374c5f07cf19169f9b9d346dd5dc48b}
|
||
\strng{authornamehash}{f374c5f07cf19169f9b9d346dd5dc48b}
|
||
\strng{authorfullhash}{f374c5f07cf19169f9b9d346dd5dc48b}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.ibm.com/history/personal-computer}}
|
||
\field{title}{IBM Personal Computer}
|
||
\field{year}{2024}
|
||
\endentry
|
||
\entry{asus_kgpe_d16_manual}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=cb6ab3315634a1e4d11b091ba48b60ba}{%
|
||
family={Asus},
|
||
familyi={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{cb6ab3315634a1e4d11b091ba48b60ba}
|
||
\strng{fullhash}{cb6ab3315634a1e4d11b091ba48b60ba}
|
||
\strng{bibnamehash}{cb6ab3315634a1e4d11b091ba48b60ba}
|
||
\strng{authorbibnamehash}{cb6ab3315634a1e4d11b091ba48b60ba}
|
||
\strng{authornamehash}{cb6ab3315634a1e4d11b091ba48b60ba}
|
||
\strng{authorfullhash}{cb6ab3315634a1e4d11b091ba48b60ba}
|
||
\field{sortinit}{A}
|
||
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.asus.com/Commercial-Servers-Workstations/KGPE-D16/HelpDesk_Manual/}}
|
||
\field{note}{Accessed: 2024-07-05}
|
||
\field{title}{Asus KGPE-D16 Mainboard Documentation and User Manuals}
|
||
\endentry
|
||
\entry{BashunVladimir2013Tytb}{inproceedings}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=4a5038a2f4919d18f44c606b5fbdb93d}{%
|
||
family={Bashun},
|
||
familyi={B\bibinitperiod},
|
||
given={Vladimir},
|
||
giveni={V\bibinitperiod}}}%
|
||
{{hash=0ea851562b66de79b6cc110c50262139}{%
|
||
family={Sergeev},
|
||
familyi={S\bibinitperiod},
|
||
given={Anton},
|
||
giveni={A\bibinitperiod}}}%
|
||
{{hash=333cc37093d65377f9615effb666f734}{%
|
||
family={Minchenkov},
|
||
familyi={M\bibinitperiod},
|
||
given={Victor},
|
||
giveni={V\bibinitperiod}}}%
|
||
{{hash=158ad3101768b62c909a2c0a1492121b}{%
|
||
family={Yakovlev},
|
||
familyi={Y\bibinitperiod},
|
||
given={Alexandr},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{FRUCT Oy}%
|
||
}
|
||
\strng{namehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
|
||
\strng{fullhash}{0504a7a243df533003b0e6f52f3a4cbb}
|
||
\strng{bibnamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
|
||
\strng{authorbibnamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
|
||
\strng{authornamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
|
||
\strng{authorfullhash}{0504a7a243df533003b0e6f52f3a4cbb}
|
||
\field{sortinit}{B}
|
||
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{14th Conference of Open Innovation Association FRUCT}
|
||
\field{isbn}{1479949779}
|
||
\field{issn}{2305-7254}
|
||
\field{number}{14}
|
||
\field{title}{Too young to be secure: Analysis of UEFI threats and vulnerabilities}
|
||
\field{volume}{232}
|
||
\field{year}{2013}
|
||
\true{nocite}
|
||
\field{pages}{16\bibrangedash 24}
|
||
\range{pages}{9}
|
||
\keyw{Hardware ; Microprogramming}
|
||
\endentry
|
||
\entry{bellosa2010}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=0b751768f42680d6d1d66ffe0e720d7a}{%
|
||
family={Bellosa},
|
||
familyi={B\bibinitperiod},
|
||
given={Frank},
|
||
giveni={F\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{0b751768f42680d6d1d66ffe0e720d7a}
|
||
\strng{fullhash}{0b751768f42680d6d1d66ffe0e720d7a}
|
||
\strng{bibnamehash}{0b751768f42680d6d1d66ffe0e720d7a}
|
||
\strng{authorbibnamehash}{0b751768f42680d6d1d66ffe0e720d7a}
|
||
\strng{authornamehash}{0b751768f42680d6d1d66ffe0e720d7a}
|
||
\strng{authorfullhash}{0b751768f42680d6d1d66ffe0e720d7a}
|
||
\field{sortinit}{B}
|
||
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Journal of Embedded Systems}
|
||
\field{number}{3}
|
||
\field{title}{Impact of ACPI on Operating System Control}
|
||
\field{volume}{12}
|
||
\field{year}{2010}
|
||
\field{pages}{134\bibrangedash 142}
|
||
\range{pages}{9}
|
||
\endentry
|
||
\entry{proprivacy_intel_me}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=8f544ee2d07626a301eb14f2d8af6b0b}{%
|
||
family={Bischoff},
|
||
familyi={B\bibinitperiod},
|
||
given={Paul},
|
||
giveni={P\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{8f544ee2d07626a301eb14f2d8af6b0b}
|
||
\strng{fullhash}{8f544ee2d07626a301eb14f2d8af6b0b}
|
||
\strng{bibnamehash}{8f544ee2d07626a301eb14f2d8af6b0b}
|
||
\strng{authorbibnamehash}{8f544ee2d07626a301eb14f2d8af6b0b}
|
||
\strng{authornamehash}{8f544ee2d07626a301eb14f2d8af6b0b}
|
||
\strng{authorfullhash}{8f544ee2d07626a301eb14f2d8af6b0b}
|
||
\field{sortinit}{B}
|
||
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Intel Management Engine: The obscure chip that does a lot for your computer}
|
||
\field{year}{2020}
|
||
\verb{urlraw}
|
||
\verb https://proprivacy.com/privacy-news/intel-management-engine
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://proprivacy.com/privacy-news/intel-management-engine
|
||
\endverb
|
||
\endentry
|
||
\entry{brown2003linuxbios}{inproceedings}{}
|
||
\true{moreauthor}
|
||
\true{morelabelname}
|
||
\name{author}{1}{}{%
|
||
{{hash=6d5fbc7b030fdbbd1911745166f16173}{%
|
||
family={Brown},
|
||
familyi={B\bibinitperiod},
|
||
given={R.\bibnamedelimi E.},
|
||
giveni={R\bibinitperiod\bibinitdelim E\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{04c51642671734d12e40a8fa99413da3}
|
||
\strng{fullhash}{04c51642671734d12e40a8fa99413da3}
|
||
\strng{bibnamehash}{04c51642671734d12e40a8fa99413da3}
|
||
\strng{authorbibnamehash}{04c51642671734d12e40a8fa99413da3}
|
||
\strng{authornamehash}{04c51642671734d12e40a8fa99413da3}
|
||
\strng{authorfullhash}{04c51642671734d12e40a8fa99413da3}
|
||
\field{sortinit}{B}
|
||
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Proceedings of the 2003 Linux Symposium}
|
||
\field{title}{LinuxBIOS as an Open-Source Firmware Alternative}
|
||
\field{year}{2003}
|
||
\endentry
|
||
\entry{bulygin2013chipset}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=eef1f99451dc4439bba543be3db1e296}{%
|
||
family={Bulygin},
|
||
familyi={B\bibinitperiod},
|
||
given={Maxim},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{eef1f99451dc4439bba543be3db1e296}
|
||
\strng{fullhash}{eef1f99451dc4439bba543be3db1e296}
|
||
\strng{bibnamehash}{eef1f99451dc4439bba543be3db1e296}
|
||
\strng{authorbibnamehash}{eef1f99451dc4439bba543be3db1e296}
|
||
\strng{authornamehash}{eef1f99451dc4439bba543be3db1e296}
|
||
\strng{authorfullhash}{eef1f99451dc4439bba543be3db1e296}
|
||
\field{sortinit}{B}
|
||
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Security Architecture Journal}
|
||
\field{number}{2}
|
||
\field{title}{Chipset-Level Control: Understanding Intel ME and AMD PSP}
|
||
\field{volume}{18}
|
||
\field{year}{2013}
|
||
\field{pages}{45\bibrangedash 56}
|
||
\range{pages}{12}
|
||
\endentry
|
||
\entry{burnett_ddr3}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=70ed1943e8d3a50c06615ef57a082097}{%
|
||
family={Burnett},
|
||
familyi={B\bibinitperiod},
|
||
given={Jon},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{70ed1943e8d3a50c06615ef57a082097}
|
||
\strng{fullhash}{70ed1943e8d3a50c06615ef57a082097}
|
||
\strng{bibnamehash}{70ed1943e8d3a50c06615ef57a082097}
|
||
\strng{authorbibnamehash}{70ed1943e8d3a50c06615ef57a082097}
|
||
\strng{authornamehash}{70ed1943e8d3a50c06615ef57a082097}
|
||
\strng{authorfullhash}{70ed1943e8d3a50c06615ef57a082097}
|
||
\field{sortinit}{B}
|
||
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{Presentation at Freescale Technology Forum}
|
||
\field{month}{7}
|
||
\field{note}{Freescale Semiconductor, Inc.}
|
||
\field{title}{DDR3 Design Considerations for PCB Applications (AN111)}
|
||
\field{year}{2009}
|
||
\endentry
|
||
\entry{chang2013}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=701500fa4f83c75c8ce39152916ce4e4}{%
|
||
family={Chang},
|
||
familyi={C\bibinitperiod},
|
||
given={H.},
|
||
giveni={H\bibinitperiod}}}%
|
||
{{hash=f5ad93423c3c7f823659822ec5c53567}{%
|
||
family={Smith},
|
||
familyi={S\bibinitperiod},
|
||
given={A.},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{264aea26982367258ae277f4cc9fa221}
|
||
\strng{fullhash}{264aea26982367258ae277f4cc9fa221}
|
||
\strng{bibnamehash}{264aea26982367258ae277f4cc9fa221}
|
||
\strng{authorbibnamehash}{264aea26982367258ae277f4cc9fa221}
|
||
\strng{authornamehash}{264aea26982367258ae277f4cc9fa221}
|
||
\strng{authorfullhash}{264aea26982367258ae277f4cc9fa221}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{International Journal of Information Security}
|
||
\field{number}{3}
|
||
\field{title}{UEFI Secure Boot in Modern Computing}
|
||
\field{volume}{12}
|
||
\field{year}{2013}
|
||
\field{pages}{231\bibrangedash 241}
|
||
\range{pages}{11}
|
||
\verb{doi}
|
||
\verb 10.1007/s10207-013-0191-1
|
||
\endverb
|
||
\endentry
|
||
\entry{ChengKaixing2021TOWo}{article}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=87e95c9cd0e83c710aef63227be51556}{%
|
||
family={Cheng},
|
||
familyi={C\bibinitperiod},
|
||
given={Kaixing},
|
||
giveni={K\bibinitperiod}}}%
|
||
{{hash=ab6761e53ea7e208d052bb326c60a591}{%
|
||
family={Luo},
|
||
familyi={L\bibinitperiod},
|
||
given={Zhongqiang},
|
||
giveni={Z\bibinitperiod}}}%
|
||
{{hash=d36c068c70cdd51ab157707f650f61bd}{%
|
||
family={Xiong},
|
||
familyi={X\bibinitperiod},
|
||
given={Xingzhong},
|
||
giveni={X\bibinitperiod}}}%
|
||
{{hash=f68e00e53402fcf8f0b2d36b636a13f7}{%
|
||
family={Wei},
|
||
familyi={W\bibinitperiod},
|
||
given={Xiaohan},
|
||
giveni={X\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Warsaw}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Polish Academy of Sciences}%
|
||
}
|
||
\strng{namehash}{817b54c9451b3142d9599daf5c62743a}
|
||
\strng{fullhash}{7ec50c9638fcc2077922aca6c3c1a162}
|
||
\strng{bibnamehash}{817b54c9451b3142d9599daf5c62743a}
|
||
\strng{authorbibnamehash}{817b54c9451b3142d9599daf5c62743a}
|
||
\strng{authornamehash}{817b54c9451b3142d9599daf5c62743a}
|
||
\strng{authorfullhash}{7ec50c9638fcc2077922aca6c3c1a162}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{2081-8491}
|
||
\field{journaltitle}{International Journal of Electronics and Telecommunications}
|
||
\field{number}{3}
|
||
\field{title}{Two Optimization Ways of DDR3 Transmission Line Equal-Length Wiring Based on Signal Integrity}
|
||
\field{volume}{67}
|
||
\field{year}{2021}
|
||
\true{nocite}
|
||
\field{pages}{385\bibrangedash 394}
|
||
\range{pages}{10}
|
||
\keyw{Crosstalk ; Design ; Electric lines ; Electronic circuits ; Optimal designs (Statistics) ; Printed circuits ; Telecommunication lines}
|
||
\endentry
|
||
\entry{ChevalierRonny2017CBMA}{inproceedings}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=e3838e961a75d380f57305816860be14}{%
|
||
family={Chevalier},
|
||
familyi={C\bibinitperiod},
|
||
given={Ronny},
|
||
giveni={R\bibinitperiod}}}%
|
||
{{hash=79ef26f7c6cc9bdb0662b770ffff087e}{%
|
||
family={Villatel},
|
||
familyi={V\bibinitperiod},
|
||
given={Maugan},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=3f349c38e0bf643a4c718ce0de9adff7}{%
|
||
family={Plaquin},
|
||
familyi={P\bibinitperiod},
|
||
given={David},
|
||
giveni={D\bibinitperiod}}}%
|
||
{{hash=72305a66e62a613c6b8f457c34d60a37}{%
|
||
family={Hiet},
|
||
familyi={H\bibinitperiod},
|
||
given={Guillaume},
|
||
giveni={G\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{ACM}%
|
||
}
|
||
\strng{namehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
|
||
\strng{fullhash}{c9ed3e65bcc94b7daf77a3092cf55b3e}
|
||
\strng{bibnamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
|
||
\strng{authorbibnamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
|
||
\strng{authornamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
|
||
\strng{authorfullhash}{c9ed3e65bcc94b7daf77a3092cf55b3e}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode}
|
||
\field{volume}{2017}
|
||
\field{year}{2017}
|
||
\true{nocite}
|
||
\field{pages}{399\bibrangedash 411}
|
||
\range{pages}{13}
|
||
\keyw{Computer science}
|
||
\endentry
|
||
\entry{coreboot_mem_management}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=9d0db915bc81244c5474dc57d9fb132a}{%
|
||
family={{Coreboot Project}},
|
||
familyi={C\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{fullhash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{bibnamehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{authorbibnamehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{authornamehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{authorfullhash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Coreboot Developer Manual}
|
||
\verb{urlraw}
|
||
\verb https://www.coreboot.org/Developer_Manual
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.coreboot.org/Developer_Manual
|
||
\endverb
|
||
\endentry
|
||
\entry{coreboot_4_11}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=9d0db915bc81244c5474dc57d9fb132a}{%
|
||
family={{Coreboot Project}},
|
||
familyi={C\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{fullhash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{bibnamehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{authorbibnamehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{authornamehash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\strng{authorfullhash}{9d0db915bc81244c5474dc57d9fb132a}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-24}
|
||
\field{title}{coreboot repository, tag 4.11}
|
||
\field{year}{2019}
|
||
\verb{urlraw}
|
||
\verb https://review.coreboot.org/plugins/gitiles/coreboot/+/refs/tags/4.11
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://review.coreboot.org/plugins/gitiles/coreboot/+/refs/tags/4.11
|
||
\endverb
|
||
\endentry
|
||
\entry{intel_acpi_programming_2023}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{4}
|
||
\field{note}{Accessed: 2024-08-24}
|
||
\field{title}{ACPI Programming Reference}
|
||
\field{year}{2023}
|
||
\verb{urlraw}
|
||
\verb https://cdrdv2.intel.com/v1/dl/getContent/772726
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://cdrdv2.intel.com/v1/dl/getContent/772726
|
||
\endverb
|
||
\endentry
|
||
\entry{intel_acpi_spec}{book}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Intel Corporation}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Advanced Configuration and Power Interface (ACPI) Specification}
|
||
\field{year}{1996}
|
||
\verb{urlraw}
|
||
\verb https://uefi.org/specifications
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://uefi.org/specifications
|
||
\endverb
|
||
\endentry
|
||
\entry{intel_csme}{report}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Intel Converged Security and Management Engine (CSME) Security White Paper}
|
||
\field{type}{techreport}
|
||
\field{year}{2020}
|
||
\verb{urlraw}
|
||
\verb https://software.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://software.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{intel_acpi_introduction_2023}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{4}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{4}
|
||
\field{note}{Accessed: 2024-08-24}
|
||
\field{title}{Introduction to ACPI}
|
||
\field{year}{2023}
|
||
\verb{urlraw}
|
||
\verb https://cdrdv2.intel.com/v1/dl/getContent/772721
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://cdrdv2.intel.com/v1/dl/getContent/772721
|
||
\endverb
|
||
\endentry
|
||
\entry{intel_smm}{report}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{5}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{System Management Mode}
|
||
\field{type}{techreport}
|
||
\field{year}{2016}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/system-management-mode.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/system-management-mode.html
|
||
\endverb
|
||
\endentry
|
||
\entry{Intel2018}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{6}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Intel Developer's Manual}
|
||
\field{note}{Available online: https://www.intel.com/content/www/us/en/processors/architectures-software-developer-manuals.html}
|
||
\field{title}{Understanding Intel's Microcode}
|
||
\field{year}{2018}
|
||
\endentry
|
||
\entry{intel_uefi}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Intel},
|
||
giveni={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
|
||
\field{extraname}{7}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.intel.com/content/www/us/en/architecture-and-technology/unified-extensible-firmware-interface.html}}
|
||
\field{title}{Unified Extensible Firmware Interface (UEFI)}
|
||
\field{year}{2020}
|
||
\endentry
|
||
\entry{microsoft_uefi}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=91da9dc9e484daf8dc9ed72055907025}{%
|
||
family={Corporation},
|
||
familyi={C\bibinitperiod},
|
||
given={Microsoft},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{91da9dc9e484daf8dc9ed72055907025}
|
||
\strng{fullhash}{91da9dc9e484daf8dc9ed72055907025}
|
||
\strng{bibnamehash}{91da9dc9e484daf8dc9ed72055907025}
|
||
\strng{authorbibnamehash}{91da9dc9e484daf8dc9ed72055907025}
|
||
\strng{authornamehash}{91da9dc9e484daf8dc9ed72055907025}
|
||
\strng{authorfullhash}{91da9dc9e484daf8dc9ed72055907025}
|
||
\field{extraname}{8}
|
||
\field{sortinit}{C}
|
||
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://docs.microsoft.com/en-us/windows-hardware/drivers/bringup/uefi-firmware}}
|
||
\field{title}{UEFI Firmware}
|
||
\field{year}{2019}
|
||
\endentry
|
||
\entry{boingboing_intel_me}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=f07392ff66b0c83a1520683a348eabe1}{%
|
||
family={Doctorow},
|
||
familyi={D\bibinitperiod},
|
||
given={Cory},
|
||
giveni={C\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{f07392ff66b0c83a1520683a348eabe1}
|
||
\strng{fullhash}{f07392ff66b0c83a1520683a348eabe1}
|
||
\strng{bibnamehash}{f07392ff66b0c83a1520683a348eabe1}
|
||
\strng{authorbibnamehash}{f07392ff66b0c83a1520683a348eabe1}
|
||
\strng{authornamehash}{f07392ff66b0c83a1520683a348eabe1}
|
||
\strng{authorfullhash}{f07392ff66b0c83a1520683a348eabe1}
|
||
\field{sortinit}{D}
|
||
\field{sortinithash}{6f385f66841fb5e82009dc833c761848}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Intel x86 processors ship with a secret backdoor}
|
||
\field{year}{2016}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html
|
||
\endverb
|
||
\endentry
|
||
\entry{ast2050_memory}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=d6cfb2b8c4b3f9440ec4642438129367}{%
|
||
family={Doe},
|
||
familyi={D\bibinitperiod},
|
||
given={Jane},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{MemoryTech Publications}%
|
||
}
|
||
\strng{namehash}{d6cfb2b8c4b3f9440ec4642438129367}
|
||
\strng{fullhash}{d6cfb2b8c4b3f9440ec4642438129367}
|
||
\strng{bibnamehash}{d6cfb2b8c4b3f9440ec4642438129367}
|
||
\strng{authorbibnamehash}{d6cfb2b8c4b3f9440ec4642438129367}
|
||
\strng{authornamehash}{d6cfb2b8c4b3f9440ec4642438129367}
|
||
\strng{authorfullhash}{d6cfb2b8c4b3f9440ec4642438129367}
|
||
\field{sortinit}{D}
|
||
\field{sortinithash}{6f385f66841fb5e82009dc833c761848}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Memory Systems Review}
|
||
\field{number}{2}
|
||
\field{title}{DDR2 Memory Controller in the ASpeed AST2050}
|
||
\field{volume}{22}
|
||
\field{year}{2015}
|
||
\field{pages}{33\bibrangedash 40}
|
||
\range{pages}{8}
|
||
\endentry
|
||
\entry{domas2015}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=e063217a45afb6221ff3c567a914f9c6}{%
|
||
family={Domas},
|
||
familyi={D\bibinitperiod},
|
||
given={Christopher},
|
||
giveni={C\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{e063217a45afb6221ff3c567a914f9c6}
|
||
\strng{fullhash}{e063217a45afb6221ff3c567a914f9c6}
|
||
\strng{bibnamehash}{e063217a45afb6221ff3c567a914f9c6}
|
||
\strng{authorbibnamehash}{e063217a45afb6221ff3c567a914f9c6}
|
||
\strng{authornamehash}{e063217a45afb6221ff3c567a914f9c6}
|
||
\strng{authorfullhash}{e063217a45afb6221ff3c567a914f9c6}
|
||
\field{sortinit}{D}
|
||
\field{sortinithash}{6f385f66841fb5e82009dc833c761848}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Black Hat USA}
|
||
\field{title}{The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation}
|
||
\field{year}{2015}
|
||
\verb{urlraw}
|
||
\verb https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{EmbletonShawn2013Sran}{article}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=3b28637e31b5ac5e8b5e6d0d47dbf1c8}{%
|
||
family={Embleton},
|
||
familyi={E\bibinitperiod},
|
||
given={Shawn},
|
||
giveni={S\bibinitperiod}}}%
|
||
{{hash=d4614bca4697f3204b4fb2065b3aa398}{%
|
||
family={Sparks},
|
||
familyi={S\bibinitperiod},
|
||
given={Sherri},
|
||
giveni={S\bibinitperiod}}}%
|
||
{{hash=b77acdf6b74461ff6a92af7a7d440fa3}{%
|
||
family={Zou},
|
||
familyi={Z\bibinitperiod},
|
||
given={Cliff\bibnamedelima C.},
|
||
giveni={C\bibinitperiod\bibinitdelim C\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{location}{1}{%
|
||
{London}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Blackwell Publishing Ltd}%
|
||
}
|
||
\strng{namehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
|
||
\strng{fullhash}{9b0a73761fbcedfbdb8adb9d212d86b4}
|
||
\strng{bibnamehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
|
||
\strng{authorbibnamehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
|
||
\strng{authornamehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
|
||
\strng{authorfullhash}{9b0a73761fbcedfbdb8adb9d212d86b4}
|
||
\field{sortinit}{E}
|
||
\field{sortinithash}{8da8a182d344d5b9047633dfc0cc9131}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{1939-0114}
|
||
\field{journaltitle}{Security and communication networks}
|
||
\field{number}{12}
|
||
\field{title}{SMM rootkit: a new breed of OS independent malware}
|
||
\field{volume}{6}
|
||
\field{year}{2013}
|
||
\true{nocite}
|
||
\field{pages}{1590\bibrangedash 1605}
|
||
\range{pages}{16}
|
||
\endentry
|
||
\entry{ErmolovMarkM.2022Uxit}{article}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=3055d85c35b8ec376b72c37aee6c5dc7}{%
|
||
family={Ermolov},
|
||
familyi={E\bibinitperiod},
|
||
given={Mark\bibnamedelima M.},
|
||
giveni={M\bibinitperiod\bibinitdelim M\bibinitperiod}}}%
|
||
{{hash=c57c726603ec1f6560c829a62c0f06cd}{%
|
||
family={Sklyarov},
|
||
familyi={S\bibinitperiod},
|
||
given={Dmitry\bibnamedelima V.},
|
||
giveni={D\bibinitperiod\bibinitdelim V\bibinitperiod}}}%
|
||
{{hash=5e1e5a24ce4665215ba4b95331fc2169}{%
|
||
family={Goryachy},
|
||
familyi={G\bibinitperiod},
|
||
given={Maxim\bibnamedelima S.},
|
||
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{publisher}{2}{%
|
||
{Joint Stock Company "Experimental Scientific}%
|
||
{Production Association SPELS}%
|
||
}
|
||
\strng{namehash}{1e472da30097e5e57577602911d0c81a}
|
||
\strng{fullhash}{1e472da30097e5e57577602911d0c81a}
|
||
\strng{bibnamehash}{1e472da30097e5e57577602911d0c81a}
|
||
\strng{authorbibnamehash}{1e472da30097e5e57577602911d0c81a}
|
||
\strng{authornamehash}{1e472da30097e5e57577602911d0c81a}
|
||
\strng{authorfullhash}{1e472da30097e5e57577602911d0c81a}
|
||
\field{sortinit}{E}
|
||
\field{sortinithash}{8da8a182d344d5b9047633dfc0cc9131}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{2074-7128}
|
||
\field{journaltitle}{Bezopasnostʹ informatÍ¡s︡ionnykh tekhnologiÄ}
|
||
\field{number}{4}
|
||
\field{title}{Undocumented x86 instructions to control the CPU at the microarchitecture level in modern INTEL processors}
|
||
\field{volume}{29}
|
||
\field{year}{2022}
|
||
\true{nocite}
|
||
\field{pages}{27\bibrangedash 41}
|
||
\range{pages}{15}
|
||
\endentry
|
||
\entry{acpi_spec}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c4a3e6668448f707c96f886df3346fc0}{%
|
||
family={Forum},
|
||
familyi={F\bibinitperiod},
|
||
given={UEFI},
|
||
giveni={U\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{fullhash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://uefi.org/sites/default/files/resources/ACPI_Spec_6_5_Aug29.pdf}}
|
||
\field{note}{Accessed: 2024-07-05}
|
||
\field{title}{ACPI Specification}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{uefi_spec}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c4a3e6668448f707c96f886df3346fc0}{%
|
||
family={Forum},
|
||
familyi={F\bibinitperiod},
|
||
given={UEFI},
|
||
giveni={U\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{fullhash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://uefi.org/specifications}}
|
||
\field{title}{UEFI Specification}
|
||
\field{year}{2021}
|
||
\endentry
|
||
\entry{uefi}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c4a3e6668448f707c96f886df3346fc0}{%
|
||
family={Forum},
|
||
familyi={F\bibinitperiod},
|
||
given={UEFI},
|
||
giveni={U\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{fullhash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://uefi.org/}}
|
||
\field{title}{Unified Extensible Firmware Interface}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{coprocessor_smm_monitoring}{article}{}
|
||
\true{moreauthor}
|
||
\true{morelabelname}
|
||
\name{author}{1}{}{%
|
||
{{hash=905dd1958bf443fbba3af917505aca40}{%
|
||
family={Francillon},
|
||
familyi={F\bibinitperiod},
|
||
given={Aurelien},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b5a25eafffa389330f5e5e7c6f486e81}
|
||
\strng{fullhash}{b5a25eafffa389330f5e5e7c6f486e81}
|
||
\strng{bibnamehash}{b5a25eafffa389330f5e5e7c6f486e81}
|
||
\strng{authorbibnamehash}{b5a25eafffa389330f5e5e7c6f486e81}
|
||
\strng{authornamehash}{b5a25eafffa389330f5e5e7c6f486e81}
|
||
\strng{authorfullhash}{b5a25eafffa389330f5e5e7c6f486e81}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{arXiv}
|
||
\field{title}{Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode}
|
||
\field{year}{2018}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://arxiv.org/abs/1803.02700
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://arxiv.org/abs/1803.02700
|
||
\endverb
|
||
\endentry
|
||
\entry{fsf_ryf}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=cb96118d65be9f05ad10bd5cfdaf0f6d}{%
|
||
family={{Free Software Foundation}},
|
||
familyi={F\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{fullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{bibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{authorbibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{authornamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{authorfullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Respects Your Freedom (RYF) Certification}
|
||
\field{year}{2017}
|
||
\verb{urlraw}
|
||
\verb https://ryf.fsf.org/products/VikingsD16
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://ryf.fsf.org/products/VikingsD16
|
||
\endverb
|
||
\endentry
|
||
\entry{fsf_intel_me}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=cb96118d65be9f05ad10bd5cfdaf0f6d}{%
|
||
family={{Free Software Foundation}},
|
||
familyi={F\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{fullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{bibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{authorbibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{authornamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\strng{authorfullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{The Management Engine: An Attack on Computer Users' Freedom}
|
||
\field{year}{2016}
|
||
\verb{urlraw}
|
||
\verb https://www.fsf.org/patrons/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.fsf.org/patrons/blogs/sysadmin/the-management-engine-an-attack-on-computer-users-freedom
|
||
\endverb
|
||
\endentry
|
||
\entry{freiberger2000fire}{book}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=d3ab7b5c9a381bafc1c1c3eb700a3667}{%
|
||
family={Freiberger},
|
||
familyi={F\bibinitperiod},
|
||
given={Paul},
|
||
giveni={P\bibinitperiod}}}%
|
||
{{hash=e5ca5deb8cf29fc68cc22b811f14ffe5}{%
|
||
family={Swaine},
|
||
familyi={S\bibinitperiod},
|
||
given={Michael},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{McGraw-Hill}%
|
||
}
|
||
\strng{namehash}{ca99d1758e4beb9842f62e3a5c030576}
|
||
\strng{fullhash}{ca99d1758e4beb9842f62e3a5c030576}
|
||
\strng{bibnamehash}{ca99d1758e4beb9842f62e3a5c030576}
|
||
\strng{authorbibnamehash}{ca99d1758e4beb9842f62e3a5c030576}
|
||
\strng{authornamehash}{ca99d1758e4beb9842f62e3a5c030576}
|
||
\strng{authorfullhash}{ca99d1758e4beb9842f62e3a5c030576}
|
||
\field{sortinit}{F}
|
||
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Fire in the Valley: The Birth and Death of the Personal Computer}
|
||
\field{year}{2000}
|
||
\endentry
|
||
\entry{gopikrishna2021novel}{thesis}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=9867142dbcfb52fac76189436d952c3c}{%
|
||
family={Gopikrishna},
|
||
familyi={G\bibinitperiod},
|
||
given={Siddula},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{International Institute of Information Technology, Hyderabad}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Hyderabad, India}%
|
||
}
|
||
\strng{namehash}{9867142dbcfb52fac76189436d952c3c}
|
||
\strng{fullhash}{9867142dbcfb52fac76189436d952c3c}
|
||
\strng{bibnamehash}{9867142dbcfb52fac76189436d952c3c}
|
||
\strng{authorbibnamehash}{9867142dbcfb52fac76189436d952c3c}
|
||
\strng{authornamehash}{9867142dbcfb52fac76189436d952c3c}
|
||
\strng{authorfullhash}{9867142dbcfb52fac76189436d952c3c}
|
||
\field{sortinit}{G}
|
||
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{2}
|
||
\field{note}{Accessed: 2024-08-24}
|
||
\field{title}{A Novel Impedance Calibration Method for Low Cost Memory Applications}
|
||
\field{type}{Master of Science Thesis}
|
||
\field{year}{2021}
|
||
\verb{urlraw}
|
||
\verb https://cdn.iiit.ac.in/cdn/web2py.iiit.ac.in/research_centres/publications/download/mastersthesis.pdf.a761b452d5c4ae57.476f70696b726973686e615f4d537468657369735f3230303935303034392e706466.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://cdn.iiit.ac.in/cdn/web2py.iiit.ac.in/research_centres/publications/download/mastersthesis.pdf.a761b452d5c4ae57.476f70696b726973686e615f4d537468657369735f3230303935303034392e706466.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{blackhat_me_hack}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=e450be1043f8bd6abbfc1a479f2d7700}{%
|
||
family={Goryachy},
|
||
familyi={G\bibinitperiod},
|
||
given={Maxim},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=1d6029a2369e520927fdca29718123a0}{%
|
||
family={Ermolov},
|
||
familyi={E\bibinitperiod},
|
||
given={Mark},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{6053ddd30f543c5477a5425e5b6b645a}
|
||
\strng{fullhash}{6053ddd30f543c5477a5425e5b6b645a}
|
||
\strng{bibnamehash}{6053ddd30f543c5477a5425e5b6b645a}
|
||
\strng{authorbibnamehash}{6053ddd30f543c5477a5425e5b6b645a}
|
||
\strng{authornamehash}{6053ddd30f543c5477a5425e5b6b645a}
|
||
\strng{authorfullhash}{6053ddd30f543c5477a5425e5b6b645a}
|
||
\field{sortinit}{G}
|
||
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Black Hat Europe}
|
||
\field{title}{How to Hack a Turned Off Computer, or Running Unsigned Code in Intel Management Engine}
|
||
\field{year}{2017}
|
||
\field{pages}{1\bibrangedash 23}
|
||
\range{pages}{23}
|
||
\verb{urlraw}
|
||
\verb https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{grewal_ibm_pc}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=4296abffda91fa0c8d79d848107a62ed}{%
|
||
family={Grewal},
|
||
familyi={G\bibinitperiod},
|
||
given={Jimmy},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{4296abffda91fa0c8d79d848107a62ed}
|
||
\strng{fullhash}{4296abffda91fa0c8d79d848107a62ed}
|
||
\strng{bibnamehash}{4296abffda91fa0c8d79d848107a62ed}
|
||
\strng{authorbibnamehash}{4296abffda91fa0c8d79d848107a62ed}
|
||
\strng{authornamehash}{4296abffda91fa0c8d79d848107a62ed}
|
||
\strng{authorfullhash}{4296abffda91fa0c8d79d848107a62ed}
|
||
\field{sortinit}{G}
|
||
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{Armonk Institute}
|
||
\field{title}{The Creation of the IBM PC}
|
||
\field{year}{2024}
|
||
\endentry
|
||
\entry{acpi_os_support}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=d41895e4fca09a2ffb0c95190f6d6aca}{%
|
||
family={Gschwind},
|
||
familyi={G\bibinitperiod},
|
||
given={Michael},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{d41895e4fca09a2ffb0c95190f6d6aca}
|
||
\strng{fullhash}{d41895e4fca09a2ffb0c95190f6d6aca}
|
||
\strng{bibnamehash}{d41895e4fca09a2ffb0c95190f6d6aca}
|
||
\strng{authorbibnamehash}{d41895e4fca09a2ffb0c95190f6d6aca}
|
||
\strng{authornamehash}{d41895e4fca09a2ffb0c95190f6d6aca}
|
||
\strng{authorfullhash}{d41895e4fca09a2ffb0c95190f6d6aca}
|
||
\field{sortinit}{G}
|
||
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{IEEE Micro}
|
||
\field{title}{Advanced Configuration and Power Interface: The Operating System Perspective}
|
||
\field{volume}{20}
|
||
\field{year}{2000}
|
||
\field{pages}{82\bibrangedash 89}
|
||
\range{pages}{8}
|
||
\verb{doi}
|
||
\verb 10.1109/40.888702
|
||
\endverb
|
||
\endentry
|
||
\entry{HaiYa2024Awah}{article}{}
|
||
\name{author}{5}{}{%
|
||
{{hash=82476f74d1aa84fe5485d95cc0300627}{%
|
||
family={Hai},
|
||
familyi={H\bibinitperiod},
|
||
given={Ya},
|
||
giveni={Y\bibinitperiod}}}%
|
||
{{hash=0138deaf332692ced30d823b9cebc488}{%
|
||
family={Liu},
|
||
familyi={L\bibinitperiod},
|
||
given={Fei},
|
||
giveni={F\bibinitperiod}}}%
|
||
{{hash=b2fd4f53b1682ad08d45675c5176cc23}{%
|
||
family={Wang},
|
||
familyi={W\bibinitperiod},
|
||
given={Yongshan},
|
||
giveni={Y\bibinitperiod}}}%
|
||
{{hash=64c07533f16224f4ccf4b077a5c83862}{%
|
||
family={Fu},
|
||
familyi={F\bibinitperiod},
|
||
given={Liyin},
|
||
giveni={L\bibinitperiod}}}%
|
||
{{hash=e731d63b9ff656be7ffed30b9350e444}{%
|
||
family={Huo},
|
||
familyi={H\bibinitperiod},
|
||
given={Jian},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Elsevier Ltd}%
|
||
}
|
||
\strng{namehash}{4342b97637f2f5c989781de1c21b5b75}
|
||
\strng{fullhash}{69b66a3731899e73435dc338915031a4}
|
||
\strng{bibnamehash}{4342b97637f2f5c989781de1c21b5b75}
|
||
\strng{authorbibnamehash}{4342b97637f2f5c989781de1c21b5b75}
|
||
\strng{authornamehash}{4342b97637f2f5c989781de1c21b5b75}
|
||
\strng{authorfullhash}{69b66a3731899e73435dc338915031a4}
|
||
\field{sortinit}{H}
|
||
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{1879-2391}
|
||
\field{journaltitle}{Microelectronics}
|
||
\field{title}{A wide-frequency and high-precision ZQ calibration circuit for NAND Flash memory}
|
||
\field{volume}{143}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\field{pages}{106051\bibrangedash}
|
||
\range{pages}{-1}
|
||
\endentry
|
||
\entry{heasman2007}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=433d3e3ec136bfc723af40458ccae9c5}{%
|
||
family={Heasman},
|
||
familyi={H\bibinitperiod},
|
||
given={John},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{433d3e3ec136bfc723af40458ccae9c5}
|
||
\strng{fullhash}{433d3e3ec136bfc723af40458ccae9c5}
|
||
\strng{bibnamehash}{433d3e3ec136bfc723af40458ccae9c5}
|
||
\strng{authorbibnamehash}{433d3e3ec136bfc723af40458ccae9c5}
|
||
\strng{authornamehash}{433d3e3ec136bfc723af40458ccae9c5}
|
||
\strng{authorfullhash}{433d3e3ec136bfc723af40458ccae9c5}
|
||
\field{sortinit}{H}
|
||
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Black Hat USA}
|
||
\field{title}{Implementing and Detecting an ACPI BIOS Rootkit}
|
||
\field{year}{2007}
|
||
\verb{urlraw}
|
||
\verb https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{herrmann2017dissecting}{misc}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=e18ff7cbbfcdc61f56502bf602f3d175}{%
|
||
family={Herrmann},
|
||
familyi={H\bibinitperiod},
|
||
given={Maximilian},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=4f9a2ad1ebed231172893123b8cfd84b}{%
|
||
family={Niemietz},
|
||
familyi={N\bibinitperiod},
|
||
given={Martin},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{325ce8bcc71d701e0ea670c133512cdb}
|
||
\strng{fullhash}{325ce8bcc71d701e0ea670c133512cdb}
|
||
\strng{bibnamehash}{325ce8bcc71d701e0ea670c133512cdb}
|
||
\strng{authorbibnamehash}{325ce8bcc71d701e0ea670c133512cdb}
|
||
\strng{authornamehash}{325ce8bcc71d701e0ea670c133512cdb}
|
||
\strng{authorfullhash}{325ce8bcc71d701e0ea670c133512cdb}
|
||
\field{sortinit}{H}
|
||
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{Conference presentation at the 34th Chaos Communication Congress (34C3)}
|
||
\field{note}{Accessed: 2024-08-27}
|
||
\field{title}{Dissecting the AMD Platform Security Processor}
|
||
\field{year}{2017}
|
||
\verb{urlraw}
|
||
\verb https://media.ccc.de/v/thms-38-dissecting-the-amd-platform-security-processor
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://media.ccc.de/v/thms-38-dissecting-the-amd-platform-security-processor
|
||
\endverb
|
||
\endentry
|
||
\entry{hill_impact_caching}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=c5fd1af61abfb4398ded7625bf0ea46f}{%
|
||
family={Hill},
|
||
familyi={H\bibinitperiod},
|
||
given={M.\bibnamedelimi D.},
|
||
giveni={M\bibinitperiod\bibinitdelim D\bibinitperiod}}}%
|
||
{{hash=2d42b38cfbd98455927c6acaf50b3c5e}{%
|
||
family={Marty},
|
||
familyi={M\bibinitperiod},
|
||
given={M.\bibnamedelimi R.},
|
||
giveni={M\bibinitperiod\bibinitdelim R\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{ACM}%
|
||
}
|
||
\strng{namehash}{747d589c93ffb32b514aaefd75b1a4ce}
|
||
\strng{fullhash}{747d589c93ffb32b514aaefd75b1a4ce}
|
||
\strng{bibnamehash}{747d589c93ffb32b514aaefd75b1a4ce}
|
||
\strng{authorbibnamehash}{747d589c93ffb32b514aaefd75b1a4ce}
|
||
\strng{authornamehash}{747d589c93ffb32b514aaefd75b1a4ce}
|
||
\strng{authorfullhash}{747d589c93ffb32b514aaefd75b1a4ce}
|
||
\field{sortinit}{H}
|
||
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Communications of the ACM}
|
||
\field{number}{12}
|
||
\field{title}{The Impact of Caching on Multicore Performance}
|
||
\field{volume}{51}
|
||
\field{year}{2008}
|
||
\field{pages}{48\bibrangedash 54}
|
||
\range{pages}{7}
|
||
\endentry
|
||
\entry{huang2009invisible}{inproceedings}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=87de624435b4bb727ab42d0fecb06b84}{%
|
||
family={Huang},
|
||
familyi={H\bibinitperiod},
|
||
given={Rich},
|
||
giveni={R\bibinitperiod}}}%
|
||
{{hash=5d0ddda3a367ceb26fbaeca02e391c22}{%
|
||
family={Smith},
|
||
familyi={S\bibinitperiod},
|
||
given={John},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{organization}{1}{%
|
||
{ACM}%
|
||
}
|
||
\strng{namehash}{230eb9fcc0a53acffc076a3fe8c94cda}
|
||
\strng{fullhash}{230eb9fcc0a53acffc076a3fe8c94cda}
|
||
\strng{bibnamehash}{230eb9fcc0a53acffc076a3fe8c94cda}
|
||
\strng{authorbibnamehash}{230eb9fcc0a53acffc076a3fe8c94cda}
|
||
\strng{authornamehash}{230eb9fcc0a53acffc076a3fe8c94cda}
|
||
\strng{authorfullhash}{230eb9fcc0a53acffc076a3fe8c94cda}
|
||
\field{sortinit}{H}
|
||
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Proceedings of the 16th ACM Conference on Computer and Communications Security}
|
||
\field{title}{Invisible Hypervisor: An Analysis of System Management Mode}
|
||
\field{year}{2009}
|
||
\field{pages}{25\bibrangedash 35}
|
||
\range{pages}{11}
|
||
\endentry
|
||
\entry{micron_ddr3}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=bb9782d6d5d1c95c67b7b316cc17615a}{%
|
||
family={Inc},
|
||
familyi={I\bibinitperiod},
|
||
given={Micron\bibnamedelima Technology},
|
||
giveni={M\bibinitperiod\bibinitdelim T\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{bb9782d6d5d1c95c67b7b316cc17615a}
|
||
\strng{fullhash}{bb9782d6d5d1c95c67b7b316cc17615a}
|
||
\strng{bibnamehash}{bb9782d6d5d1c95c67b7b316cc17615a}
|
||
\strng{authorbibnamehash}{bb9782d6d5d1c95c67b7b316cc17615a}
|
||
\strng{authornamehash}{bb9782d6d5d1c95c67b7b316cc17615a}
|
||
\strng{authorfullhash}{bb9782d6d5d1c95c67b7b316cc17615a}
|
||
\field{sortinit}{I}
|
||
\field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{number}{TN-41-02}
|
||
\field{title}{Technical Note: DDR3 ZQ Calibration}
|
||
\field{year}{2008}
|
||
\endentry
|
||
\entry{intel_me}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b7f0fb90e404efb48f8a85a517dec3c9}{%
|
||
family={{Intel Corporation}},
|
||
familyi={I\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b7f0fb90e404efb48f8a85a517dec3c9}
|
||
\strng{fullhash}{b7f0fb90e404efb48f8a85a517dec3c9}
|
||
\strng{bibnamehash}{b7f0fb90e404efb48f8a85a517dec3c9}
|
||
\strng{authorbibnamehash}{b7f0fb90e404efb48f8a85a517dec3c9}
|
||
\strng{authornamehash}{b7f0fb90e404efb48f8a85a517dec3c9}
|
||
\strng{authorfullhash}{b7f0fb90e404efb48f8a85a517dec3c9}
|
||
\field{sortinit}{I}
|
||
\field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.intel.com/content/www/us/en/support/articles/000008927/software/chipset-software.html}}
|
||
\field{note}{Accessed: 2024-07-05}
|
||
\field{title}{Intel Management Engine (Intel ME)}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{netgarage_intel_me}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=64eb2dd5b853ed2e3e6ede4df0c13b5a}{%
|
||
family={io.netgarage},
|
||
familyi={i\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a}
|
||
\strng{fullhash}{64eb2dd5b853ed2e3e6ede4df0c13b5a}
|
||
\strng{bibnamehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a}
|
||
\strng{authorbibnamehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a}
|
||
\strng{authornamehash}{64eb2dd5b853ed2e3e6ede4df0c13b5a}
|
||
\strng{authorfullhash}{64eb2dd5b853ed2e3e6ede4df0c13b5a}
|
||
\field{sortinit}{i}
|
||
\field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Intel Management Engine}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://io.netgarage.org/me/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://io.netgarage.org/me/
|
||
\endverb
|
||
\endentry
|
||
\entry{Johnson1989}{book}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=4b4d002de5f92b71453190d67ffb47fe}{%
|
||
family={Johnson},
|
||
familyi={J\bibinitperiod},
|
||
given={B.W.},
|
||
giveni={B\bibinitperiod}}}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Englewood Cliffs, NJ}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Prentice-Hall}%
|
||
}
|
||
\strng{namehash}{4b4d002de5f92b71453190d67ffb47fe}
|
||
\strng{fullhash}{4b4d002de5f92b71453190d67ffb47fe}
|
||
\strng{bibnamehash}{4b4d002de5f92b71453190d67ffb47fe}
|
||
\strng{authorbibnamehash}{4b4d002de5f92b71453190d67ffb47fe}
|
||
\strng{authornamehash}{4b4d002de5f92b71453190d67ffb47fe}
|
||
\strng{authorfullhash}{4b4d002de5f92b71453190d67ffb47fe}
|
||
\field{sortinit}{J}
|
||
\field{sortinithash}{b2f54a9081ace9966a7cb9413811edb4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Fault-Tolerant Microprocessor Design}
|
||
\field{year}{1989}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{openbmc_customization}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5a25bc91f524ca6dfc2ecf9f4a13903c}{%
|
||
family={Jones},
|
||
familyi={J\bibinitperiod},
|
||
given={Michael},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Open Source Press}%
|
||
}
|
||
\strng{namehash}{5a25bc91f524ca6dfc2ecf9f4a13903c}
|
||
\strng{fullhash}{5a25bc91f524ca6dfc2ecf9f4a13903c}
|
||
\strng{bibnamehash}{5a25bc91f524ca6dfc2ecf9f4a13903c}
|
||
\strng{authorbibnamehash}{5a25bc91f524ca6dfc2ecf9f4a13903c}
|
||
\strng{authornamehash}{5a25bc91f524ca6dfc2ecf9f4a13903c}
|
||
\strng{authorfullhash}{5a25bc91f524ca6dfc2ecf9f4a13903c}
|
||
\field{sortinit}{J}
|
||
\field{sortinithash}{b2f54a9081ace9966a7cb9413811edb4}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Open Source Firmware Journal}
|
||
\field{number}{1}
|
||
\field{title}{Customizing OpenBMC for ASpeed AST2050}
|
||
\field{volume}{5}
|
||
\field{year}{2017}
|
||
\field{pages}{12\bibrangedash 18}
|
||
\range{pages}{7}
|
||
\endentry
|
||
\entry{offsec_bios_smm}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=5f0adf197576f745db5616612237177f}{%
|
||
family={Kallenberg},
|
||
familyi={K\bibinitperiod},
|
||
given={Corey},
|
||
giveni={C\bibinitperiod}}}%
|
||
{{hash=befb18be37cd351fd592753473a8806e}{%
|
||
family={Kovah},
|
||
familyi={K\bibinitperiod},
|
||
given={Xeno},
|
||
giveni={X\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{70fa1c8368a19b98e1600548ec87ea1f}
|
||
\strng{fullhash}{70fa1c8368a19b98e1600548ec87ea1f}
|
||
\strng{bibnamehash}{70fa1c8368a19b98e1600548ec87ea1f}
|
||
\strng{authorbibnamehash}{70fa1c8368a19b98e1600548ec87ea1f}
|
||
\strng{authornamehash}{70fa1c8368a19b98e1600548ec87ea1f}
|
||
\strng{authorfullhash}{70fa1c8368a19b98e1600548ec87ea1f}
|
||
\field{sortinit}{K}
|
||
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{BIOS and SMM Internals}
|
||
\field{year}{2014}
|
||
\verb{urlraw}
|
||
\verb https://opensecuritytraining.info/IntroBIOS_files/Day1_07_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMM.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://opensecuritytraining.info/IntroBIOS_files/Day1_07_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMM.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{kim2010design}{inproceedings}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=8220787d0eaa6f1c680840bf616c1cf4}{%
|
||
family={Kim},
|
||
familyi={K\bibinitperiod},
|
||
given={Dong-Seok},
|
||
giveni={D\bibinithyphendelim S\bibinitperiod}}}%
|
||
{{hash=296a3e46de4ab457e55baf6264bb8637}{%
|
||
family={Oh},
|
||
familyi={O\bibinitperiod},
|
||
given={Dong-Seok},
|
||
giveni={D\bibinithyphendelim S\bibinitperiod}}}%
|
||
{{hash=f73fbd8e5fd85d5a4945843500511870}{%
|
||
family={Lee},
|
||
familyi={L\bibinitperiod},
|
||
given={Seok-Hoon},
|
||
giveni={S\bibinithyphendelim H\bibinitperiod}}}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Seoul, South Korea}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Hanyang University}%
|
||
}
|
||
\strng{namehash}{c95e43f58c55dbd4375f1961197becbf}
|
||
\strng{fullhash}{c95e43f58c55dbd4375f1961197becbf}
|
||
\strng{bibnamehash}{c95e43f58c55dbd4375f1961197becbf}
|
||
\strng{authorbibnamehash}{c95e43f58c55dbd4375f1961197becbf}
|
||
\strng{authornamehash}{c95e43f58c55dbd4375f1961197becbf}
|
||
\strng{authorfullhash}{c95e43f58c55dbd4375f1961197becbf}
|
||
\field{sortinit}{K}
|
||
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Proceedings of the 2010 Fall Conference on Semiconductor and Display Technology}
|
||
\field{note}{Retrieved from https://koreascience.kr/article/CFKO200835536002505.pdf}
|
||
\field{title}{Design DDR3 ZQ Calibration having improved impedance matching}
|
||
\field{year}{2010}
|
||
\field{pages}{191\bibrangedash 192}
|
||
\range{pages}{2}
|
||
\endentry
|
||
\entry{uefi_smm_security}{book}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=0f5d712d2df5a2eb138c92b8957c02fe}{%
|
||
family={Krebs},
|
||
familyi={K\bibinitperiod},
|
||
given={Ronald\bibnamedelima D.},
|
||
giveni={R\bibinitperiod\bibinitdelim D\bibinitperiod}}}%
|
||
{{hash=607b9f5f93f583fb8a4a28cc4a5937ae}{%
|
||
family={Zimmer},
|
||
familyi={Z\bibinitperiod},
|
||
given={Vincent},
|
||
giveni={V\bibinitperiod}}}%
|
||
{{hash=15304da870cc73994d161d9c4681f167}{%
|
||
family={Marisetty},
|
||
familyi={M\bibinitperiod},
|
||
given={Suresh},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Intel Press}%
|
||
}
|
||
\strng{namehash}{e3efa1b46cc11cf21c59b308c4a3951d}
|
||
\strng{fullhash}{e3efa1b46cc11cf21c59b308c4a3951d}
|
||
\strng{bibnamehash}{e3efa1b46cc11cf21c59b308c4a3951d}
|
||
\strng{authorbibnamehash}{e3efa1b46cc11cf21c59b308c4a3951d}
|
||
\strng{authornamehash}{e3efa1b46cc11cf21c59b308c4a3951d}
|
||
\strng{authorfullhash}{e3efa1b46cc11cf21c59b308c4a3951d}
|
||
\field{sortinit}{K}
|
||
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{edition}{3rd}
|
||
\field{isbn}{978-0974364906}
|
||
\field{title}{Beyond BIOS: Developing with the Unified Extensible Firmware Interface}
|
||
\field{year}{2017}
|
||
\endentry
|
||
\entry{heise_amt_attack}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b7a2e18f77259e34d5b676fd04412bb3}{%
|
||
family={Krempl},
|
||
familyi={K\bibinitperiod},
|
||
given={Stefan},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b7a2e18f77259e34d5b676fd04412bb3}
|
||
\strng{fullhash}{b7a2e18f77259e34d5b676fd04412bb3}
|
||
\strng{bibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
|
||
\strng{authorbibnamehash}{b7a2e18f77259e34d5b676fd04412bb3}
|
||
\strng{authornamehash}{b7a2e18f77259e34d5b676fd04412bb3}
|
||
\strng{authorfullhash}{b7a2e18f77259e34d5b676fd04412bb3}
|
||
\field{sortinit}{K}
|
||
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Intel-Fernwartung AMT bei Angriffen auf PCs genutzt}
|
||
\field{year}{2017}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://www.heise.de/news/Intel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.heise.de/news/Intel-Fernwartung-AMT-bei-Angriffen-auf-PCs-genutzt-3739441.html
|
||
\endverb
|
||
\endentry
|
||
\entry{numa}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=419af6f87214eb9f2bfa2a03a877cb04}{%
|
||
family={Lameter},
|
||
familyi={L\bibinitperiod},
|
||
given={Christoph},
|
||
giveni={C\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{419af6f87214eb9f2bfa2a03a877cb04}
|
||
\strng{fullhash}{419af6f87214eb9f2bfa2a03a877cb04}
|
||
\strng{bibnamehash}{419af6f87214eb9f2bfa2a03a877cb04}
|
||
\strng{authorbibnamehash}{419af6f87214eb9f2bfa2a03a877cb04}
|
||
\strng{authornamehash}{419af6f87214eb9f2bfa2a03a877cb04}
|
||
\strng{authorfullhash}{419af6f87214eb9f2bfa2a03a877cb04}
|
||
\field{sortinit}{L}
|
||
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Queue}
|
||
\field{month}{07}
|
||
\field{title}{NUMA (Non-Uniform Memory Access): An Overview}
|
||
\field{volume}{11}
|
||
\field{year}{2013}
|
||
\true{nocite}
|
||
\verb{doi}
|
||
\verb 10.1145/2508834.2513149
|
||
\endverb
|
||
\endentry
|
||
\entry{phoronix_hdcp_2_2_i915}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b51b9464b5589cf5380e3b897d0a43b6}{%
|
||
family={Larabel},
|
||
familyi={L\bibinitperiod},
|
||
given={Michael},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{L}
|
||
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{HDCP 2.2 Coming To The Intel i915 Linux DRM Driver}
|
||
\field{year}{2018}
|
||
\verb{urlraw}
|
||
\verb https://www.phoronix.com/news/HDCP-2.2-For-i915-DRM
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.phoronix.com/news/HDCP-2.2-For-i915-DRM
|
||
\endverb
|
||
\endentry
|
||
\entry{phoronix_hdcp_2_2_driver}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b51b9464b5589cf5380e3b897d0a43b6}{%
|
||
family={Larabel},
|
||
familyi={L\bibinitperiod},
|
||
given={Michael},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{fullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{bibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authorbibnamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authornamehash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\strng{authorfullhash}{b51b9464b5589cf5380e3b897d0a43b6}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{L}
|
||
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{HDCP 2.2 Support Being Worked On For Intel Linux Graphics Driver}
|
||
\field{year}{2017}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://www.phoronix.com/news/HDCP-2.2-Intel-Linux-Driver
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.phoronix.com/news/HDCP-2.2-Intel-Linux-Driver
|
||
\endverb
|
||
\endentry
|
||
\entry{cyber_smm_hack}{report}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=e0fdb42b953ef541418307b69787da0c}{%
|
||
family={Levillain},
|
||
familyi={L\bibinitperiod},
|
||
given={Olivier},
|
||
giveni={O\bibinitperiod}}}%
|
||
{{hash=905dd1958bf443fbba3af917505aca40}{%
|
||
family={Francillon},
|
||
familyi={F\bibinitperiod},
|
||
given={Aurelien},
|
||
giveni={A\bibinitperiod}}}%
|
||
{{hash=6adb386609edde844be6de64fdefae58}{%
|
||
family={Fratantonio},
|
||
familyi={F\bibinitperiod},
|
||
given={Yanick},
|
||
giveni={Y\bibinitperiod}}}%
|
||
{{hash=14cb44e160bd085923d2216f78867ae2}{%
|
||
family={Balzarotti},
|
||
familyi={B\bibinitperiod},
|
||
given={Davide},
|
||
giveni={D\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{ANSSI, Eurecom}%
|
||
}
|
||
\strng{namehash}{153c7a919bb6611940c22d22f6bc457e}
|
||
\strng{fullhash}{08e99c283b578e98b81e72ebd0e9b364}
|
||
\strng{bibnamehash}{153c7a919bb6611940c22d22f6bc457e}
|
||
\strng{authorbibnamehash}{153c7a919bb6611940c22d22f6bc457e}
|
||
\strng{authornamehash}{153c7a919bb6611940c22d22f6bc457e}
|
||
\strng{authorfullhash}{08e99c283b578e98b81e72ebd0e9b364}
|
||
\field{sortinit}{L}
|
||
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{How to Protect the BIOS and its Secrets}
|
||
\field{type}{techreport}
|
||
\field{year}{2011}
|
||
\verb{urlraw}
|
||
\verb https://cyber.gouv.fr/sites/default/files/IMG/pdf/Cansec_final.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://cyber.gouv.fr/sites/default/files/IMG/pdf/Cansec_final.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{LiHuiyong2014RRoD}{article}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=5372cdbd3052ccafb8205b01ca06d602}{%
|
||
family={Li},
|
||
familyi={L\bibinitperiod},
|
||
given={Huiyong},
|
||
giveni={H\bibinitperiod}}}%
|
||
{{hash=14f153fc939f9cdd32dcf4e81e3246d5}{%
|
||
family={Jiang},
|
||
familyi={J\bibinitperiod},
|
||
given={Hongxu},
|
||
giveni={H\bibinitperiod}}}%
|
||
{{hash=a9c8728e355996d027a7e56b60820a18}{%
|
||
family={Li},
|
||
familyi={L\bibinitperiod},
|
||
given={Bo},
|
||
giveni={B\bibinitperiod}}}%
|
||
{{hash=a4bbc4ff61eed77cccdacec89a39b2c6}{%
|
||
family={Duan},
|
||
familyi={D\bibinitperiod},
|
||
given={Miyi},
|
||
giveni={M\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{location}{1}{%
|
||
{United States}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Hindawi Publishing Corporation}%
|
||
}
|
||
\strng{namehash}{2dbb6be882893005ad907124afa1f218}
|
||
\strng{fullhash}{e9ffcb79d98e9c0c1203b8f7d307dab3}
|
||
\strng{bibnamehash}{2dbb6be882893005ad907124afa1f218}
|
||
\strng{authorbibnamehash}{2dbb6be882893005ad907124afa1f218}
|
||
\strng{authornamehash}{2dbb6be882893005ad907124afa1f218}
|
||
\strng{authorfullhash}{e9ffcb79d98e9c0c1203b8f7d307dab3}
|
||
\field{sortinit}{L}
|
||
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{2356-6140}
|
||
\field{journaltitle}{TheScientificWorld}
|
||
\field{title}{Reflection Reduction on DDR3 High-Speed Bus by Improved PSO}
|
||
\field{volume}{2014}
|
||
\field{year}{2014}
|
||
\true{nocite}
|
||
\field{pages}{257972\bibrangedash 11}
|
||
\range{pages}{-60}
|
||
\keyw{Algorithms ; Buses ; Efficiency ; Experiments ; Mathematical models ; Mathematical optimization ; Motor vehicles ; Properties ; Reading ; Signals and signaling}
|
||
\endentry
|
||
\entry{samsung_ddr3}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=18ee2446b26d5ac68be7ad188faa3f28}{%
|
||
family={Ltd},
|
||
familyi={L\bibinitperiod},
|
||
given={Samsung\bibnamedelimb Electronics\bibnamedelima Co.},
|
||
giveni={S\bibinitperiod\bibinitdelim E\bibinitperiod\bibinitdelim C\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{18ee2446b26d5ac68be7ad188faa3f28}
|
||
\strng{fullhash}{18ee2446b26d5ac68be7ad188faa3f28}
|
||
\strng{bibnamehash}{18ee2446b26d5ac68be7ad188faa3f28}
|
||
\strng{authorbibnamehash}{18ee2446b26d5ac68be7ad188faa3f28}
|
||
\strng{authornamehash}{18ee2446b26d5ac68be7ad188faa3f28}
|
||
\strng{authorfullhash}{18ee2446b26d5ac68be7ad188faa3f28}
|
||
\field{sortinit}{L}
|
||
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{month}{11}
|
||
\field{number}{TN-41-02}
|
||
\field{title}{DDR3 SDRAM Specification Rev 1.4}
|
||
\field{year}{2011}
|
||
\endentry
|
||
\entry{blobs}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=368573a2727cae4111de5ad066039578}{%
|
||
family={maintainers},
|
||
familyi={m\bibinitperiod},
|
||
given={GNU\bibnamedelima Boot},
|
||
giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod},
|
||
prefix={project},
|
||
prefixi={p\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{fullhash}{368573a2727cae4111de5ad066039578}
|
||
\strng{bibnamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authorbibnamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authornamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authorfullhash}{368573a2727cae4111de5ad066039578}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{m}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.gnu.org/software/gnuboot/web/faq.html}}
|
||
\field{note}{Accessed: 2024-07-23}
|
||
\field{title}{Frequently Asked Questions}
|
||
\endentry
|
||
\entry{gnuboot}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=368573a2727cae4111de5ad066039578}{%
|
||
family={maintainers},
|
||
familyi={m\bibinitperiod},
|
||
given={GNU\bibnamedelima Boot},
|
||
giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod},
|
||
prefix={project},
|
||
prefixi={p\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{fullhash}{368573a2727cae4111de5ad066039578}
|
||
\strng{bibnamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authorbibnamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authornamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authorfullhash}{368573a2727cae4111de5ad066039578}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{m}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{GNU Boot --- Free your BIOS today!}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://www.gnu.org/software/gnuboot/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.gnu.org/software/gnuboot/
|
||
\endverb
|
||
\endentry
|
||
\entry{gnuboot_status}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=368573a2727cae4111de5ad066039578}{%
|
||
family={maintainers},
|
||
familyi={m\bibinitperiod},
|
||
given={GNU\bibnamedelima Boot},
|
||
giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod},
|
||
prefix={project},
|
||
prefixi={p\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{fullhash}{368573a2727cae4111de5ad066039578}
|
||
\strng{bibnamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authorbibnamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authornamehash}{368573a2727cae4111de5ad066039578}
|
||
\strng{authorfullhash}{368573a2727cae4111de5ad066039578}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{m}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{GNU Boot --- Status}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://www.gnu.org/software/gnuboot/web/status.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.gnu.org/software/gnuboot/web/status.html
|
||
\endverb
|
||
\endentry
|
||
\entry{markuze2021}{inproceedings}{}
|
||
\name{author}{7}{}{%
|
||
{{hash=bddf7b21e1c8949d4103f016bbdbf08f}{%
|
||
family={Markuze},
|
||
familyi={M\bibinitperiod},
|
||
given={Alex},
|
||
giveni={A\bibinitperiod}}}%
|
||
{{hash=4d511e0a6f00c8ad5dab79333097c89a}{%
|
||
family={Vargaftik},
|
||
familyi={V\bibinitperiod},
|
||
given={Shay},
|
||
giveni={S\bibinitperiod}}}%
|
||
{{hash=566b0f1f830072ac0d45f6ef80b04254}{%
|
||
family={Kupfer},
|
||
familyi={K\bibinitperiod},
|
||
given={Gil},
|
||
giveni={G\bibinitperiod}}}%
|
||
{{hash=a287912a74a981d9138e6ab9f22c55c5}{%
|
||
family={Pismenny},
|
||
familyi={P\bibinitperiod},
|
||
given={Boris},
|
||
giveni={B\bibinitperiod}}}%
|
||
{{hash=b37f5c4b4ff4d2c5c57d026a8a01e86a}{%
|
||
family={Amit},
|
||
familyi={A\bibinitperiod},
|
||
given={Nadav},
|
||
giveni={N\bibinitperiod}}}%
|
||
{{hash=3959b4901b01ec379cdb6e26d406f37d}{%
|
||
family={Morrison},
|
||
familyi={M\bibinitperiod},
|
||
given={Adam},
|
||
giveni={A\bibinitperiod}}}%
|
||
{{hash=d4e54c84413641d186ef3461d7e0d1f7}{%
|
||
family={Tsafrir},
|
||
familyi={T\bibinitperiod},
|
||
given={Dan},
|
||
giveni={D\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{ACM}%
|
||
}
|
||
\strng{namehash}{7df12f9031d9ee32c2b44bcc39f18d9d}
|
||
\strng{fullhash}{ec0a172ad1c93eebd683b01a914d1db6}
|
||
\strng{bibnamehash}{7df12f9031d9ee32c2b44bcc39f18d9d}
|
||
\strng{authorbibnamehash}{7df12f9031d9ee32c2b44bcc39f18d9d}
|
||
\strng{authornamehash}{7df12f9031d9ee32c2b44bcc39f18d9d}
|
||
\strng{authorfullhash}{ec0a172ad1c93eebd683b01a914d1db6}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Proceedings of the Sixteenth European Conference on Computer Systems (EuroSys '21)}
|
||
\field{title}{Understanding DMA Attacks in the Presence of an IOMMU}
|
||
\field{year}{2021}
|
||
\verb{urlraw}
|
||
\verb https://research.vmware.com/publications/understanding-dma-attacks-in-the-presence-of-an-iommu
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://research.vmware.com/publications/understanding-dma-attacks-in-the-presence-of-an-iommu
|
||
\endverb
|
||
\endentry
|
||
\entry{mcclean2017uefi}{book}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c75cb68c65bcee56f0aa882d79503b7b}{%
|
||
family={McClean},
|
||
familyi={M\bibinitperiod},
|
||
given={Laura},
|
||
giveni={L\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{O'Reilly Media}%
|
||
}
|
||
\strng{namehash}{c75cb68c65bcee56f0aa882d79503b7b}
|
||
\strng{fullhash}{c75cb68c65bcee56f0aa882d79503b7b}
|
||
\strng{bibnamehash}{c75cb68c65bcee56f0aa882d79503b7b}
|
||
\strng{authorbibnamehash}{c75cb68c65bcee56f0aa882d79503b7b}
|
||
\strng{authornamehash}{c75cb68c65bcee56f0aa882d79503b7b}
|
||
\strng{authorfullhash}{c75cb68c65bcee56f0aa882d79503b7b}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{UEFI: The Definitive Guide to Modern Firmware}
|
||
\field{year}{2017}
|
||
\endentry
|
||
\entry{medeiros2017}{article}{}
|
||
\name{author}{6}{}{%
|
||
{{hash=cd5b56523e512e29ac9cad15b1818b81}{%
|
||
family={Medeiros},
|
||
familyi={M\bibinitperiod},
|
||
given={Ivison},
|
||
giveni={I\bibinitperiod}}}%
|
||
{{hash=81aac05bbc300ff1dbbe6a7ddbe4f9f9}{%
|
||
family={Oliveira\bibnamedelima Dutra},
|
||
familyi={O\bibinitperiod\bibinitdelim D\bibinitperiod},
|
||
given={Jonathan},
|
||
giveni={J\bibinitperiod},
|
||
prefix={de},
|
||
prefixi={d\bibinitperiod}}}%
|
||
{{hash=2413e19308f20bc8fa40f233758c88c0}{%
|
||
family={Silva},
|
||
familyi={S\bibinitperiod},
|
||
given={Anderson\bibnamedelima Faustino},
|
||
giveni={A\bibinitperiod\bibinitdelim F\bibinitperiod},
|
||
prefix={da},
|
||
prefixi={d\bibinitperiod}}}%
|
||
{{hash=5f41c346d6f1b5bae7683d20592f3fc9}{%
|
||
family={Bigonha},
|
||
familyi={B\bibinitperiod},
|
||
given={Rafael\bibnamedelima Silva},
|
||
giveni={R\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
|
||
{{hash=df7428155f9dd9261cff7e2e0db2fb72}{%
|
||
family={Anquetil},
|
||
familyi={A\bibinitperiod},
|
||
given={Nicolas},
|
||
giveni={N\bibinitperiod}}}%
|
||
{{hash=75e1e4e2c87fe37bb8edbe9563815011}{%
|
||
family={Ducasse},
|
||
familyi={D\bibinitperiod},
|
||
given={Stéphane},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{7fc239c45cb70d84978e99f949cde22a}
|
||
\strng{fullhash}{9df4f50abd9fd1266efe374274366054}
|
||
\strng{bibnamehash}{7fc239c45cb70d84978e99f949cde22a}
|
||
\strng{authorbibnamehash}{7fc239c45cb70d84978e99f949cde22a}
|
||
\strng{authornamehash}{7fc239c45cb70d84978e99f949cde22a}
|
||
\strng{authorfullhash}{9df4f50abd9fd1266efe374274366054}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Journal of the Brazilian Computer Society}
|
||
\field{number}{1}
|
||
\field{title}{Towards a dynamic data distribution management framework based on Apache Spark}
|
||
\field{volume}{23}
|
||
\field{year}{2017}
|
||
\field{pages}{1\bibrangedash 15}
|
||
\range{pages}{15}
|
||
\verb{doi}
|
||
\verb 10.1186/s13173-017-0066-7
|
||
\endverb
|
||
\verb{urlraw}
|
||
\verb https://journal-bcs.springeropen.com/articles/10.1186/s13173-017-0066-7
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://journal-bcs.springeropen.com/articles/10.1186/s13173-017-0066-7
|
||
\endverb
|
||
\endentry
|
||
\entry{coreboot_challenges}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=af33676c3a4888dfa26a657f486708df}{%
|
||
family={Minnich},
|
||
familyi={M\bibinitperiod},
|
||
given={R.},
|
||
giveni={R\bibinitperiod}}}%
|
||
{{hash=4f177e6be4bf4c60155596239dcc4b34}{%
|
||
family={Hendricks},
|
||
familyi={H\bibinitperiod},
|
||
given={E.},
|
||
giveni={E\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{4903c46d98ac613dcc8fd38bbe396ae4}
|
||
\strng{fullhash}{4903c46d98ac613dcc8fd38bbe396ae4}
|
||
\strng{bibnamehash}{4903c46d98ac613dcc8fd38bbe396ae4}
|
||
\strng{authorbibnamehash}{4903c46d98ac613dcc8fd38bbe396ae4}
|
||
\strng{authornamehash}{4903c46d98ac613dcc8fd38bbe396ae4}
|
||
\strng{authorfullhash}{4903c46d98ac613dcc8fd38bbe396ae4}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Journal of Open Source Software}
|
||
\field{number}{29}
|
||
\field{title}{Challenges and Progress in coreboot Development}
|
||
\field{volume}{3}
|
||
\field{year}{2018}
|
||
\field{pages}{1\bibrangedash 6}
|
||
\range{pages}{6}
|
||
\verb{doi}
|
||
\verb 10.21105/joss.00429
|
||
\endverb
|
||
\endentry
|
||
\entry{minnich_status}{inproceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=996532a0f0ccb5fbf90b3fc854eb3fad}{%
|
||
family={Minnich},
|
||
familyi={M\bibinitperiod},
|
||
given={Ron},
|
||
giveni={R\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
|
||
\strng{fullhash}{996532a0f0ccb5fbf90b3fc854eb3fad}
|
||
\strng{bibnamehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
|
||
\strng{authorbibnamehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
|
||
\strng{authornamehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
|
||
\strng{authorfullhash}{996532a0f0ccb5fbf90b3fc854eb3fad}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{coreboot: Status and some history}
|
||
\field{year}{2006}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{minnich_coreboot}{article}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=996532a0f0ccb5fbf90b3fc854eb3fad}{%
|
||
family={Minnich},
|
||
familyi={M\bibinitperiod},
|
||
given={Ron},
|
||
giveni={R\bibinitperiod}}}%
|
||
{{hash=338aa5983567160bd6e7d5d77184578a}{%
|
||
family={Reinauer},
|
||
familyi={R\bibinitperiod},
|
||
given={Stefan},
|
||
giveni={S\bibinitperiod}}}%
|
||
{{hash=f51f40aa097a46fae7ce40dcd09839f8}{%
|
||
family={Georgi},
|
||
familyi={G\bibinitperiod},
|
||
given={Patrick},
|
||
giveni={P\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
|
||
\strng{fullhash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
|
||
\strng{bibnamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
|
||
\strng{authorbibnamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
|
||
\strng{authornamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
|
||
\strng{authorfullhash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Google Research}
|
||
\field{title}{coreboot: Open-Source Firmware Platform}
|
||
\field{year}{2017}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://research.google/pubs/pub45424/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://research.google/pubs/pub45424/
|
||
\endverb
|
||
\endentry
|
||
\entry{mohr2012comparative}{report}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=8e03e86ade8b47700c0dbfe66ab4829c}{%
|
||
family={Mohr},
|
||
familyi={M\bibinitperiod},
|
||
given={Benjamin},
|
||
giveni={B\bibinitperiod}}}%
|
||
}
|
||
\list{institution}{1}{%
|
||
{University of Freiburg}%
|
||
}
|
||
\strng{namehash}{8e03e86ade8b47700c0dbfe66ab4829c}
|
||
\strng{fullhash}{8e03e86ade8b47700c0dbfe66ab4829c}
|
||
\strng{bibnamehash}{8e03e86ade8b47700c0dbfe66ab4829c}
|
||
\strng{authorbibnamehash}{8e03e86ade8b47700c0dbfe66ab4829c}
|
||
\strng{authornamehash}{8e03e86ade8b47700c0dbfe66ab4829c}
|
||
\strng{authorfullhash}{8e03e86ade8b47700c0dbfe66ab4829c}
|
||
\field{sortinit}{M}
|
||
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{A Comparative Analysis of Bootloaders}
|
||
\field{type}{techreport}
|
||
\field{year}{2012}
|
||
\endentry
|
||
\entry{nuvoton}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=3c26c5dfa62a2ce99c0fffbdbd5f69f3}{%
|
||
family={{Nuvoton Technology Corporation}},
|
||
familyi={N\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
|
||
\strng{fullhash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
|
||
\strng{bibnamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
|
||
\strng{authorbibnamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
|
||
\strng{authornamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
|
||
\strng{authorfullhash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
|
||
\field{sortinit}{N}
|
||
\field{sortinithash}{22369a73d5f88983a108b63f07f37084}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Nuvoton W83795G/ADG Hardware Monitor Datasheet}
|
||
\verb{urlraw}
|
||
\verb https://www.nuvoton.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.nuvoton.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{eff_intel_me}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=4ffff1c6c9a41ed000b5647ade54accb}{%
|
||
family={O’Brien},
|
||
familyi={O\bibinitperiod},
|
||
given={Danny},
|
||
giveni={D\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{4ffff1c6c9a41ed000b5647ade54accb}
|
||
\strng{fullhash}{4ffff1c6c9a41ed000b5647ade54accb}
|
||
\strng{bibnamehash}{4ffff1c6c9a41ed000b5647ade54accb}
|
||
\strng{authorbibnamehash}{4ffff1c6c9a41ed000b5647ade54accb}
|
||
\strng{authornamehash}{4ffff1c6c9a41ed000b5647ade54accb}
|
||
\strng{authorfullhash}{4ffff1c6c9a41ed000b5647ade54accb}
|
||
\field{sortinit}{O}
|
||
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Intel’s Management Engine is a Security Hazard, and Users Need a Way to Disable It}
|
||
\field{year}{2017}
|
||
\verb{urlraw}
|
||
\verb https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it
|
||
\endverb
|
||
\endentry
|
||
\entry{AlexanderOgolyuk2017UBaI}{article}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=e471e22ecc8ac7b4a9a0aeef1178d250}{%
|
||
family={Ogolyuk},
|
||
familyi={O\bibinitperiod},
|
||
given={Alexander},
|
||
giveni={A\bibinitperiod}}}%
|
||
{{hash=6170c563f791330913063ddfb3794ab2}{%
|
||
family={Sheglov},
|
||
familyi={S\bibinitperiod},
|
||
given={Andrey},
|
||
giveni={A\bibinitperiod}}}%
|
||
{{hash=6ae0d6e6b1e57e62fd27bd8899d2b131}{%
|
||
family={Sheglov},
|
||
familyi={S\bibinitperiod},
|
||
given={Konstantin},
|
||
giveni={K\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{FRUCT}%
|
||
}
|
||
\strng{namehash}{905455d8b9db1e1077b6dddccca21810}
|
||
\strng{fullhash}{905455d8b9db1e1077b6dddccca21810}
|
||
\strng{bibnamehash}{905455d8b9db1e1077b6dddccca21810}
|
||
\strng{authorbibnamehash}{905455d8b9db1e1077b6dddccca21810}
|
||
\strng{authornamehash}{905455d8b9db1e1077b6dddccca21810}
|
||
\strng{authorfullhash}{905455d8b9db1e1077b6dddccca21810}
|
||
\field{sortinit}{O}
|
||
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{2305-7254}
|
||
\field{journaltitle}{Proceedings of the XXth Conference of Open Innovations Association FRUCT}
|
||
\field{number}{20}
|
||
\field{title}{UEFI BIOS and Intel Management Engine Attack Vectors and Vulnerabilities}
|
||
\field{volume}{776}
|
||
\field{year}{2017}
|
||
\true{nocite}
|
||
\field{pages}{657\bibrangedash 662}
|
||
\range{pages}{6}
|
||
\endentry
|
||
\entry{kernel_mei_hdcp}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=7801bf0ed827facf06b73af7e7edb095}{%
|
||
family={Organization},
|
||
familyi={O\bibinitperiod},
|
||
given={Linux\bibnamedelima Kernel},
|
||
giveni={L\bibinitperiod\bibinitdelim K\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{7801bf0ed827facf06b73af7e7edb095}
|
||
\strng{fullhash}{7801bf0ed827facf06b73af7e7edb095}
|
||
\strng{bibnamehash}{7801bf0ed827facf06b73af7e7edb095}
|
||
\strng{authorbibnamehash}{7801bf0ed827facf06b73af7e7edb095}
|
||
\strng{authornamehash}{7801bf0ed827facf06b73af7e7edb095}
|
||
\strng{authorfullhash}{7801bf0ed827facf06b73af7e7edb095}
|
||
\field{sortinit}{O}
|
||
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{High-bandwidth Digital Content Protection (HDCP)}
|
||
\field{year}{2020}
|
||
\verb{urlraw}
|
||
\verb https://www.kernel.org/doc/html//v5.8/driver-api/mei/hdcp.html
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.kernel.org/doc/html//v5.8/driver-api/mei/hdcp.html
|
||
\endverb
|
||
\endentry
|
||
\entry{osdev_gop}{online}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=2bd2931fac872535642e43e290f7d25b}{%
|
||
family={{OSDev Wiki}},
|
||
familyi={O\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{2bd2931fac872535642e43e290f7d25b}
|
||
\strng{fullhash}{2bd2931fac872535642e43e290f7d25b}
|
||
\strng{bibnamehash}{2bd2931fac872535642e43e290f7d25b}
|
||
\strng{authorbibnamehash}{2bd2931fac872535642e43e290f7d25b}
|
||
\strng{authornamehash}{2bd2931fac872535642e43e290f7d25b}
|
||
\strng{authorfullhash}{2bd2931fac872535642e43e290f7d25b}
|
||
\field{sortinit}{O}
|
||
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Graphics Output Protocol (GOP)}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://wiki.osdev.org/GOP
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://wiki.osdev.org/GOP
|
||
\endverb
|
||
\endentry
|
||
\entry{osdev_uefi}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=981adb9ea98beb2d8a06e293991365f1}{%
|
||
family={{OSDev Wiki contributors}},
|
||
familyi={O\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{fullhash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{bibnamehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{authorbibnamehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{authornamehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{authorfullhash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{O}
|
||
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 25-August-2024]}
|
||
\field{title}{{UEFI - OSDev Wiki}}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://wiki.osdev.org/UEFI
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://wiki.osdev.org/UEFI
|
||
\endverb
|
||
\endentry
|
||
\entry{osdev_uefi_memory}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=981adb9ea98beb2d8a06e293991365f1}{%
|
||
family={{OSDev Wiki contributors}},
|
||
familyi={O\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{fullhash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{bibnamehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{authorbibnamehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{authornamehash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\strng{authorfullhash}{981adb9ea98beb2d8a06e293991365f1}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{O}
|
||
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 25-August-2024]}
|
||
\field{title}{{UEFI Memory - OSDev Wiki}}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://wiki.osdev.org/UEFI#Memory
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://wiki.osdev.org/UEFI#Memory
|
||
\endverb
|
||
\endentry
|
||
\entry{pearson2014}{inproceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=0cb7f02abd4eddb75a923fdbd4722b97}{%
|
||
family={Pearson},
|
||
familyi={P\bibinitperiod},
|
||
given={Timothy},
|
||
giveni={T\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{0cb7f02abd4eddb75a923fdbd4722b97}
|
||
\strng{fullhash}{0cb7f02abd4eddb75a923fdbd4722b97}
|
||
\strng{bibnamehash}{0cb7f02abd4eddb75a923fdbd4722b97}
|
||
\strng{authorbibnamehash}{0cb7f02abd4eddb75a923fdbd4722b97}
|
||
\strng{authornamehash}{0cb7f02abd4eddb75a923fdbd4722b97}
|
||
\strng{authorfullhash}{0cb7f02abd4eddb75a923fdbd4722b97}
|
||
\field{sortinit}{P}
|
||
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{The World Beyond x86}
|
||
\field{year}{2014}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{acpi_programming}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=30947d4473970fd63cd5dcb7c90a8e4a}{%
|
||
family={Project},
|
||
familyi={P\bibinitperiod},
|
||
given={ACPICA},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{30947d4473970fd63cd5dcb7c90a8e4a}
|
||
\strng{fullhash}{30947d4473970fd63cd5dcb7c90a8e4a}
|
||
\strng{bibnamehash}{30947d4473970fd63cd5dcb7c90a8e4a}
|
||
\strng{authorbibnamehash}{30947d4473970fd63cd5dcb7c90a8e4a}
|
||
\strng{authornamehash}{30947d4473970fd63cd5dcb7c90a8e4a}
|
||
\strng{authorfullhash}{30947d4473970fd63cd5dcb7c90a8e4a}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{P}
|
||
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-03}
|
||
\field{title}{ACPI Component Architecture Programmer Reference}
|
||
\field{year}{2017}
|
||
\verb{urlraw}
|
||
\verb https://acpica.org/documentation
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://acpica.org/documentation
|
||
\endverb
|
||
\endentry
|
||
\entry{coreboot_docs}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=ef0efcc19e2d35e9a880cf0cc2e05d7a}{%
|
||
family={Project},
|
||
familyi={P\bibinitperiod},
|
||
prefix={coreboot},
|
||
prefixi={c\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
|
||
\strng{fullhash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
|
||
\strng{bibnamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
|
||
\strng{authorbibnamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
|
||
\strng{authornamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
|
||
\strng{authorfullhash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
|
||
\field{sortinit}{P}
|
||
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{coreboot Documentation}
|
||
\field{year}{2023}
|
||
\verb{urlraw}
|
||
\verb https://doc.coreboot.org/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://doc.coreboot.org/
|
||
\endverb
|
||
\endentry
|
||
\entry{coreboot_payloads}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=22efab6c3f492e2d3e5ff09a274d19e3}{%
|
||
family={project},
|
||
familyi={p\bibinitperiod},
|
||
prefix={coreboot},
|
||
prefixi={c\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{fullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{bibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{authorbibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{authornamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{authorfullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{p}
|
||
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.coreboot.org/Payloads}}
|
||
\field{note}{Accessed: 2024-07-23}
|
||
\field{title}{coreboot Payloads}
|
||
\endentry
|
||
\entry{coreboot}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=22efab6c3f492e2d3e5ff09a274d19e3}{%
|
||
family={project},
|
||
familyi={p\bibinitperiod},
|
||
prefix={coreboot},
|
||
prefixi={c\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{fullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{bibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{authorbibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{authornamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\strng{authorfullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{p}
|
||
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://www.coreboot.org/}}
|
||
\field{note}{Accessed: 2024-07-23}
|
||
\field{title}{coreboot: Open Source Firmware}
|
||
\endentry
|
||
\entry{tianocore_payload}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=3bca4e299598e8c88e9dbc747a8b3c5c}{%
|
||
family={Project},
|
||
familyi={P\bibinitperiod},
|
||
given={TianoCore},
|
||
giveni={T\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{3bca4e299598e8c88e9dbc747a8b3c5c}
|
||
\strng{fullhash}{3bca4e299598e8c88e9dbc747a8b3c5c}
|
||
\strng{bibnamehash}{3bca4e299598e8c88e9dbc747a8b3c5c}
|
||
\strng{authorbibnamehash}{3bca4e299598e8c88e9dbc747a8b3c5c}
|
||
\strng{authornamehash}{3bca4e299598e8c88e9dbc747a8b3c5c}
|
||
\strng{authorfullhash}{3bca4e299598e8c88e9dbc747a8b3c5c}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{P}
|
||
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{TianoCore as a Coreboot Payload}
|
||
\field{year}{2019}
|
||
\verb{urlraw}
|
||
\verb https://github.com/tianocore/tianocore.github.io/wiki/Coreboot_UEFI_payload
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://github.com/tianocore/tianocore.github.io/wiki/Coreboot_UEFI_payload
|
||
\endverb
|
||
\endentry
|
||
\entry{raptor_engineering}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=569ce67269d64596584ac37190233093}{%
|
||
family={{Raptor Engineering LLC}},
|
||
familyi={R\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{569ce67269d64596584ac37190233093}
|
||
\strng{fullhash}{569ce67269d64596584ac37190233093}
|
||
\strng{bibnamehash}{569ce67269d64596584ac37190233093}
|
||
\strng{authorbibnamehash}{569ce67269d64596584ac37190233093}
|
||
\strng{authornamehash}{569ce67269d64596584ac37190233093}
|
||
\strng{authorfullhash}{569ce67269d64596584ac37190233093}
|
||
\field{sortinit}{R}
|
||
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 8-May-2024]}
|
||
\field{title}{Raptor Engineering website}
|
||
\field{year}{2009-2024}
|
||
\verb{urlraw}
|
||
\verb https://raptorengineering.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://raptorengineering.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{reinauer2008coreboot}{inproceedings}{}
|
||
\true{moreauthor}
|
||
\true{morelabelname}
|
||
\name{author}{1}{}{%
|
||
{{hash=338aa5983567160bd6e7d5d77184578a}{%
|
||
family={Reinauer},
|
||
familyi={R\bibinitperiod},
|
||
given={Stefan},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{87fc69411b96945ba4e4bc38d0a0f41b}
|
||
\strng{fullhash}{87fc69411b96945ba4e4bc38d0a0f41b}
|
||
\strng{bibnamehash}{87fc69411b96945ba4e4bc38d0a0f41b}
|
||
\strng{authorbibnamehash}{87fc69411b96945ba4e4bc38d0a0f41b}
|
||
\strng{authornamehash}{87fc69411b96945ba4e4bc38d0a0f41b}
|
||
\strng{authorfullhash}{87fc69411b96945ba4e4bc38d0a0f41b}
|
||
\field{sortinit}{R}
|
||
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Usenix Annual Technical Conference}
|
||
\field{title}{The coreboot Open Source BIOS - A Review}
|
||
\field{year}{2008}
|
||
\endentry
|
||
\entry{richter2011bios}{inproceedings}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=abb58308e6ee7df811f38441e9735701}{%
|
||
family={Richter},
|
||
familyi={R\bibinitperiod},
|
||
given={Felix},
|
||
giveni={F\bibinitperiod}}}%
|
||
{{hash=9df7b64d77a60e8340331f1ead58166c}{%
|
||
family={Wressnegger},
|
||
familyi={W\bibinitperiod},
|
||
given={Christian},
|
||
giveni={C\bibinitperiod}}}%
|
||
{{hash=409de46de24e2dbda2e942c5d80cb043}{%
|
||
family={Schwenk},
|
||
familyi={S\bibinitperiod},
|
||
given={Thorsten},
|
||
giveni={T\bibinitperiod}}}%
|
||
{{hash=ea36f719c6140abf47846202eb4673e0}{%
|
||
family={Muller},
|
||
familyi={M\bibinitperiod},
|
||
given={Thorsten},
|
||
giveni={T\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{8ca4cd3956658a3fde469908f7056e2d}
|
||
\strng{fullhash}{5335382c4add8a538f3e649961f8d099}
|
||
\strng{bibnamehash}{8ca4cd3956658a3fde469908f7056e2d}
|
||
\strng{authorbibnamehash}{8ca4cd3956658a3fde469908f7056e2d}
|
||
\strng{authornamehash}{8ca4cd3956658a3fde469908f7056e2d}
|
||
\strng{authorfullhash}{5335382c4add8a538f3e649961f8d099}
|
||
\field{sortinit}{R}
|
||
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{booktitle}{Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security}
|
||
\field{title}{BIOS and UEFI firmware analysis}
|
||
\field{year}{2011}
|
||
\true{nocite}
|
||
\field{pages}{7\bibrangedash 16}
|
||
\range{pages}{10}
|
||
\endentry
|
||
\entry{rosenberg1994open}{book}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=3fecee81a14fc53c8d7a0eb4baa7c3a4}{%
|
||
family={Rosenberg},
|
||
familyi={R\bibinitperiod},
|
||
given={Ronald\bibnamedelima H},
|
||
giveni={R\bibinitperiod\bibinitdelim H\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{IEEE Computer Society Press}%
|
||
}
|
||
\strng{namehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
|
||
\strng{fullhash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
|
||
\strng{bibnamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
|
||
\strng{authorbibnamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
|
||
\strng{authornamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
|
||
\strng{authorfullhash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
|
||
\field{sortinit}{R}
|
||
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Open architecture computer systems}
|
||
\field{year}{1994}
|
||
\true{nocite}
|
||
\endentry
|
||
\entry{russinovich2012}{book}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=4c2da4e3b650f0a6bffc044b397680cc}{%
|
||
family={Russinovich},
|
||
familyi={R\bibinitperiod},
|
||
given={M.\bibnamedelimi E.},
|
||
giveni={M\bibinitperiod\bibinitdelim E\bibinitperiod}}}%
|
||
{{hash=749b374b1372bc938a228f56eced2d1a}{%
|
||
family={Solomon},
|
||
familyi={S\bibinitperiod},
|
||
given={D.\bibnamedelimi A.},
|
||
giveni={D\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
|
||
{{hash=131b67d6604bc9d457955edcc178a127}{%
|
||
family={Ionescu},
|
||
familyi={I\bibinitperiod},
|
||
given={A.},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Microsoft Press}%
|
||
}
|
||
\strng{namehash}{cec07f798ad226261c1a84a121a934c0}
|
||
\strng{fullhash}{cec07f798ad226261c1a84a121a934c0}
|
||
\strng{bibnamehash}{cec07f798ad226261c1a84a121a934c0}
|
||
\strng{authorbibnamehash}{cec07f798ad226261c1a84a121a934c0}
|
||
\strng{authornamehash}{cec07f798ad226261c1a84a121a934c0}
|
||
\strng{authorfullhash}{cec07f798ad226261c1a84a121a934c0}
|
||
\field{sortinit}{R}
|
||
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{edition}{6th}
|
||
\field{title}{Windows Internals, Part 1}
|
||
\field{year}{2012}
|
||
\endentry
|
||
\entry{anandtech_bulldozer}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=a2fcb5fbf9cbaac444753f21ef5733c6}{%
|
||
family={Shimpi},
|
||
familyi={S\bibinitperiod},
|
||
given={Anand\bibnamedelima Lal},
|
||
giveni={A\bibinitperiod\bibinitdelim L\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
|
||
\strng{fullhash}{a2fcb5fbf9cbaac444753f21ef5733c6}
|
||
\strng{bibnamehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
|
||
\strng{authorbibnamehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
|
||
\strng{authornamehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
|
||
\strng{authorfullhash}{a2fcb5fbf9cbaac444753f21ef5733c6}
|
||
\field{sortinit}{S}
|
||
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{AnandTech}
|
||
\field{title}{The Bulldozer Review: AMD FX-8150 Tested}
|
||
\field{year}{2011}
|
||
\verb{urlraw}
|
||
\verb https://www.anandtech.com/show/4955/the-bulldozer-review-amd-fx8150-tested
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.anandtech.com/show/4955/the-bulldozer-review-amd-fx8150-tested
|
||
\endverb
|
||
\endentry
|
||
\entry{shin2011}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=8e68dee2d88f90cfacabb9608669b060}{%
|
||
family={Shin},
|
||
familyi={S\bibinitperiod},
|
||
given={M.},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=e57d0b1f72e19c844023fb5ae360f752}{%
|
||
family={Lee},
|
||
familyi={L\bibinitperiod},
|
||
given={K.},
|
||
giveni={K\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c3f174f40fa786c163c984606bf2335a}
|
||
\strng{fullhash}{c3f174f40fa786c163c984606bf2335a}
|
||
\strng{bibnamehash}{c3f174f40fa786c163c984606bf2335a}
|
||
\strng{authorbibnamehash}{c3f174f40fa786c163c984606bf2335a}
|
||
\strng{authornamehash}{c3f174f40fa786c163c984606bf2335a}
|
||
\strng{authorfullhash}{c3f174f40fa786c163c984606bf2335a}
|
||
\field{sortinit}{S}
|
||
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Journal of Computer Science and Technology}
|
||
\field{number}{2}
|
||
\field{title}{Design and Implementation of a UEFI-Compliant Firmware Platform}
|
||
\field{volume}{26}
|
||
\field{year}{2011}
|
||
\field{pages}{219\bibrangedash 230}
|
||
\range{pages}{12}
|
||
\verb{doi}
|
||
\verb 10.1007/s11390-011-0121-8
|
||
\endverb
|
||
\endentry
|
||
\entry{shustek2016kildall}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=c26de56d0912649a64854ccba2dbc8e1}{%
|
||
family={Shustek},
|
||
familyi={S\bibinitperiod},
|
||
given={Leonard\bibnamedelima J.},
|
||
giveni={L\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{c26de56d0912649a64854ccba2dbc8e1}
|
||
\strng{fullhash}{c26de56d0912649a64854ccba2dbc8e1}
|
||
\strng{bibnamehash}{c26de56d0912649a64854ccba2dbc8e1}
|
||
\strng{authorbibnamehash}{c26de56d0912649a64854ccba2dbc8e1}
|
||
\strng{authornamehash}{c26de56d0912649a64854ccba2dbc8e1}
|
||
\strng{authorfullhash}{c26de56d0912649a64854ccba2dbc8e1}
|
||
\field{sortinit}{S}
|
||
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{Computer History Museum Blog}
|
||
\field{note}{Accessed: August 16, 2024}
|
||
\field{title}{In His Own Words: Gary Kildall}
|
||
\field{year}{2016}
|
||
\verb{urlraw}
|
||
\verb https://computerhistory.org/blog/in-his-own-words-gary-kildall/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://computerhistory.org/blog/in-his-own-words-gary-kildall/
|
||
\endverb
|
||
\endentry
|
||
\entry{smith2019firmware}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=5dae92275f3afda5b0b3da88efb93844}{%
|
||
family={Smith},
|
||
familyi={S\bibinitperiod},
|
||
given={David},
|
||
giveni={D\bibinitperiod}}}%
|
||
{{hash=33ff2635eacd261b8950b0f1757d5b51}{%
|
||
family={Chen},
|
||
familyi={C\bibinitperiod},
|
||
given={Alice},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{a5e489f30a1acc2419b54d463c229491}
|
||
\strng{fullhash}{a5e489f30a1acc2419b54d463c229491}
|
||
\strng{bibnamehash}{a5e489f30a1acc2419b54d463c229491}
|
||
\strng{authorbibnamehash}{a5e489f30a1acc2419b54d463c229491}
|
||
\strng{authornamehash}{a5e489f30a1acc2419b54d463c229491}
|
||
\strng{authorfullhash}{a5e489f30a1acc2419b54d463c229491}
|
||
\field{sortinit}{S}
|
||
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Computer Security Review}
|
||
\field{number}{4}
|
||
\field{title}{Firmware as the New Hypervisor: A Virtualized Perspective}
|
||
\field{volume}{27}
|
||
\field{year}{2019}
|
||
\field{pages}{210\bibrangedash 225}
|
||
\range{pages}{16}
|
||
\endentry
|
||
\entry{ast2050_kvm}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5d0ddda3a367ceb26fbaeca02e391c22}{%
|
||
family={Smith},
|
||
familyi={S\bibinitperiod},
|
||
given={John},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Tech Press}%
|
||
}
|
||
\strng{namehash}{5d0ddda3a367ceb26fbaeca02e391c22}
|
||
\strng{fullhash}{5d0ddda3a367ceb26fbaeca02e391c22}
|
||
\strng{bibnamehash}{5d0ddda3a367ceb26fbaeca02e391c22}
|
||
\strng{authorbibnamehash}{5d0ddda3a367ceb26fbaeca02e391c22}
|
||
\strng{authornamehash}{5d0ddda3a367ceb26fbaeca02e391c22}
|
||
\strng{authorfullhash}{5d0ddda3a367ceb26fbaeca02e391c22}
|
||
\field{sortinit}{S}
|
||
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Journal of Embedded Computing}
|
||
\field{number}{3}
|
||
\field{title}{Remote KVM-over-IP on the ASpeed AST2050}
|
||
\field{volume}{14}
|
||
\field{year}{2014}
|
||
\field{pages}{45\bibrangedash 49}
|
||
\range{pages}{5}
|
||
\endentry
|
||
\entry{SridharanVilas2015MEiM}{article}{}
|
||
\name{author}{7}{}{%
|
||
{{hash=424e5d7c7305b93eade0897c378a833a}{%
|
||
family={Sridharan},
|
||
familyi={S\bibinitperiod},
|
||
given={Vilas},
|
||
giveni={V\bibinitperiod}}}%
|
||
{{hash=7dcd293f0266c03f1b274f6e49a7fd99}{%
|
||
family={DeBardeleben},
|
||
familyi={D\bibinitperiod},
|
||
given={Nathan},
|
||
giveni={N\bibinitperiod}}}%
|
||
{{hash=709868da6f9c5c23f722f4b7c0a473f4}{%
|
||
family={Blanchard},
|
||
familyi={B\bibinitperiod},
|
||
given={Sean},
|
||
giveni={S\bibinitperiod}}}%
|
||
{{hash=cbc6e783519df8ff0de6b6631442319a}{%
|
||
family={Ferreira},
|
||
familyi={F\bibinitperiod},
|
||
given={Kurt\bibnamedelima B.},
|
||
giveni={K\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
|
||
{{hash=18ca07e0da61f3be699c8003f4ee93b4}{%
|
||
family={Stearley},
|
||
familyi={S\bibinitperiod},
|
||
given={Jon},
|
||
giveni={J\bibinitperiod}}}%
|
||
{{hash=8411e32c5282692ec8fb33ae8efc7b3a}{%
|
||
family={Shalf},
|
||
familyi={S\bibinitperiod},
|
||
given={John},
|
||
giveni={J\bibinitperiod}}}%
|
||
{{hash=370b98113e6d3786aca18de5ef4a72ff}{%
|
||
family={Gurumurthi},
|
||
familyi={G\bibinitperiod},
|
||
given={Sudhanva},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\strng{namehash}{aeb9446378538df625b4820c6fa03b69}
|
||
\strng{fullhash}{175a0847e434ba3d53ed4787fd09be05}
|
||
\strng{bibnamehash}{aeb9446378538df625b4820c6fa03b69}
|
||
\strng{authorbibnamehash}{aeb9446378538df625b4820c6fa03b69}
|
||
\strng{authornamehash}{aeb9446378538df625b4820c6fa03b69}
|
||
\strng{authorfullhash}{175a0847e434ba3d53ed4787fd09be05}
|
||
\field{sortinit}{S}
|
||
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{0163-5964}
|
||
\field{journaltitle}{Computer architecture news}
|
||
\field{number}{1}
|
||
\field{title}{Memory Errors in Modern Systems: The Good, The Bad, and The Ugly}
|
||
\field{volume}{43}
|
||
\field{year}{2015}
|
||
\field{pages}{297\bibrangedash 310}
|
||
\range{pages}{14}
|
||
\endentry
|
||
\entry{ast2050_architecture}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5724d534bba82cf4cced0784f7ce038b}{%
|
||
family={Technology},
|
||
familyi={T\bibinitperiod},
|
||
given={ASpeed},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{fullhash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{bibnamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authorbibnamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authornamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authorfullhash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{T}
|
||
\field{sortinithash}{9af77f0292593c26bde9a56e688eaee9}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{ASpeed Whitepaper}
|
||
\field{note}{Accessed: 2024-08-21}
|
||
\field{title}{ASpeed AST2050: ARM926EJ-S Based BMC Architecture}
|
||
\field{year}{2013}
|
||
\verb{urlraw}
|
||
\verb https://www.aspeedtech.com/products.php?fPath=20&rId=29
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.aspeedtech.com/products.php?fPath=20&rId=29
|
||
\endverb
|
||
\endentry
|
||
\entry{ast2050_nic}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5724d534bba82cf4cced0784f7ce038b}{%
|
||
family={Technology},
|
||
familyi={T\bibinitperiod},
|
||
given={ASpeed},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{fullhash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{bibnamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authorbibnamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authornamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authorfullhash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{T}
|
||
\field{sortinithash}{9af77f0292593c26bde9a56e688eaee9}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-21}
|
||
\field{title}{ASpeed AST2050: Network Interface Controller for BMC}
|
||
\field{year}{2013}
|
||
\verb{urlraw}
|
||
\verb https://www.aspeedtech.com/products.php?fPath=20&rId=29
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.aspeedtech.com/products.php?fPath=20&rId=29
|
||
\endverb
|
||
\endentry
|
||
\entry{ast2050_io}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=5724d534bba82cf4cced0784f7ce038b}{%
|
||
family={Technology},
|
||
familyi={T\bibinitperiod},
|
||
given={ASpeed},
|
||
giveni={A\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{fullhash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{bibnamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authorbibnamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authornamehash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\strng{authorfullhash}{5724d534bba82cf4cced0784f7ce038b}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{T}
|
||
\field{sortinithash}{9af77f0292593c26bde9a56e688eaee9}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-21}
|
||
\field{title}{I/O Interfaces of the ASpeed AST2050}
|
||
\field{year}{2013}
|
||
\verb{urlraw}
|
||
\verb https://www.aspeedtech.com/products.php?fPath=20&rId=29
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.aspeedtech.com/products.php?fPath=20&rId=29
|
||
\endverb
|
||
\endentry
|
||
\entry{uefi_what_is_uefi}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=018a60b8cb2aa8763314c4672515eee5}{%
|
||
family={{UEFI Forum}},
|
||
familyi={U\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{018a60b8cb2aa8763314c4672515eee5}
|
||
\strng{fullhash}{018a60b8cb2aa8763314c4672515eee5}
|
||
\strng{bibnamehash}{018a60b8cb2aa8763314c4672515eee5}
|
||
\strng{authorbibnamehash}{018a60b8cb2aa8763314c4672515eee5}
|
||
\strng{authornamehash}{018a60b8cb2aa8763314c4672515eee5}
|
||
\strng{authorfullhash}{018a60b8cb2aa8763314c4672515eee5}
|
||
\field{sortinit}{U}
|
||
\field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{What is UEFI?}
|
||
\field{year}{2023}
|
||
\verb{urlraw}
|
||
\verb https://uefi.org/sites/default/files/resources/What%20is%20UEFI-Aug31-2023-Final.pdf
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://uefi.org/sites/default/files/resources/What%20is%20UEFI-Aug31-2023-Final.pdf
|
||
\endverb
|
||
\endentry
|
||
\entry{lip6_web}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=a220fc1da6562fa2e1e0bc05c201b485}{%
|
||
family={Université/CNRS},
|
||
familyi={U\bibinitperiod},
|
||
given={Sorbonne},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{a220fc1da6562fa2e1e0bc05c201b485}
|
||
\strng{fullhash}{a220fc1da6562fa2e1e0bc05c201b485}
|
||
\strng{bibnamehash}{a220fc1da6562fa2e1e0bc05c201b485}
|
||
\strng{authorbibnamehash}{a220fc1da6562fa2e1e0bc05c201b485}
|
||
\strng{authornamehash}{a220fc1da6562fa2e1e0bc05c201b485}
|
||
\strng{authorfullhash}{a220fc1da6562fa2e1e0bc05c201b485}
|
||
\field{sortinit}{U}
|
||
\field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{Laboratoire d'Informatique de Paris 6}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://www.lip6.fr/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.lip6.fr/
|
||
\endverb
|
||
\endentry
|
||
\entry{coreboot_fsf}{inproceedings}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=af41616b6f1e8e444fcc49b61089d90f}{%
|
||
family={Vandewege},
|
||
familyi={V\bibinitperiod},
|
||
given={Ward},
|
||
giveni={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{af41616b6f1e8e444fcc49b61089d90f}
|
||
\strng{fullhash}{af41616b6f1e8e444fcc49b61089d90f}
|
||
\strng{bibnamehash}{af41616b6f1e8e444fcc49b61089d90f}
|
||
\strng{authorbibnamehash}{af41616b6f1e8e444fcc49b61089d90f}
|
||
\strng{authornamehash}{af41616b6f1e8e444fcc49b61089d90f}
|
||
\strng{authorfullhash}{af41616b6f1e8e444fcc49b61089d90f}
|
||
\field{sortinit}{V}
|
||
\field{sortinithash}{afb52128e5b4dc4b843768c0113d673b}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{title}{Coreboot: the view from the FSF}
|
||
\field{year}{2008}
|
||
\endentry
|
||
\entry{VersenM.2020Rhaa}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=c442b1f2c144f99fa527ef0ae0e89787}{%
|
||
family={Versen},
|
||
familyi={V\bibinitperiod},
|
||
given={M.},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=6571a9fefd8cd260223347a23bfaf144}{%
|
||
family={Ernst},
|
||
familyi={E\bibinitperiod},
|
||
given={W.},
|
||
giveni={W\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{Elsevier Ltd}%
|
||
}
|
||
\strng{namehash}{190c742d46641dc9848cc3e17eb1b3ce}
|
||
\strng{fullhash}{190c742d46641dc9848cc3e17eb1b3ce}
|
||
\strng{bibnamehash}{190c742d46641dc9848cc3e17eb1b3ce}
|
||
\strng{authorbibnamehash}{190c742d46641dc9848cc3e17eb1b3ce}
|
||
\strng{authornamehash}{190c742d46641dc9848cc3e17eb1b3ce}
|
||
\strng{authorfullhash}{190c742d46641dc9848cc3e17eb1b3ce}
|
||
\field{sortinit}{V}
|
||
\field{sortinithash}{afb52128e5b4dc4b843768c0113d673b}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{0026-2714}
|
||
\field{journaltitle}{Microelectronics and reliability}
|
||
\field{title}{Row hammer avoidance analysis of DDR3 SDRAM}
|
||
\field{volume}{114}
|
||
\field{year}{2020}
|
||
\true{nocite}
|
||
\field{pages}{113744\bibrangedash}
|
||
\range{pages}{-1}
|
||
\endentry
|
||
\entry{vikings}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=a151e054e930181c6173dc5edbf4d8e3}{%
|
||
family={{Vikings GmbH}},
|
||
familyi={V\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{a151e054e930181c6173dc5edbf4d8e3}
|
||
\strng{fullhash}{a151e054e930181c6173dc5edbf4d8e3}
|
||
\strng{bibnamehash}{a151e054e930181c6173dc5edbf4d8e3}
|
||
\strng{authorbibnamehash}{a151e054e930181c6173dc5edbf4d8e3}
|
||
\strng{authornamehash}{a151e054e930181c6173dc5edbf4d8e3}
|
||
\strng{authorfullhash}{a151e054e930181c6173dc5edbf4d8e3}
|
||
\field{sortinit}{V}
|
||
\field{sortinithash}{afb52128e5b4dc4b843768c0113d673b}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{Vikings Hardware Recommendations for KGPE-D16}
|
||
\verb{urlraw}
|
||
\verb https://wiki.vikings.net/hardware:kgpe-d16?s[]=kgpe&s[]=d16
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://wiki.vikings.net/hardware:kgpe-d16?s[]=kgpe&s[]=d16
|
||
\endverb
|
||
\endentry
|
||
\entry{WangDong2019AIUb}{article}{}
|
||
\name{author}{2}{}{%
|
||
{{hash=4695c12fc5e5638d83abfb67ab9d459c}{%
|
||
family={Wang},
|
||
familyi={W\bibinitperiod},
|
||
given={Dong},
|
||
giveni={D\bibinitperiod}}}%
|
||
{{hash=1aac09ee1dcf318e0166bf96fdf3add8}{%
|
||
family={Dong},
|
||
familyi={D\bibinitperiod},
|
||
given={Wei\bibnamedelima Yu},
|
||
giveni={W\bibinitperiod\bibinitdelim Y\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Bristol}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{IOP Publishing}%
|
||
}
|
||
\strng{namehash}{f8e60a7e98273f88ed342577bd994ac5}
|
||
\strng{fullhash}{f8e60a7e98273f88ed342577bd994ac5}
|
||
\strng{bibnamehash}{f8e60a7e98273f88ed342577bd994ac5}
|
||
\strng{authorbibnamehash}{f8e60a7e98273f88ed342577bd994ac5}
|
||
\strng{authornamehash}{f8e60a7e98273f88ed342577bd994ac5}
|
||
\strng{authorfullhash}{f8e60a7e98273f88ed342577bd994ac5}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{1742-6588}
|
||
\field{journaltitle}{Journal of physics. Conference series}
|
||
\field{number}{4}
|
||
\field{title}{Attacking Intel UEFI by Using Cache Poisoning}
|
||
\field{volume}{1187}
|
||
\field{year}{2019}
|
||
\true{nocite}
|
||
\field{pages}{42072\bibrangedash}
|
||
\range{pages}{-1}
|
||
\keyw{Alliances ; Integrated circuits ; Poisoning}
|
||
\endentry
|
||
\entry{WaqarMuhammad2021DDCF}{article}{}
|
||
\name{author}{4}{}{%
|
||
{{hash=ee5704d66d59e3cff0ccd7340680b3cb}{%
|
||
family={Waqar},
|
||
familyi={W\bibinitperiod},
|
||
given={Muhammad},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=394c7290cf8ce4e9e957f8b00086ad41}{%
|
||
family={Bak},
|
||
familyi={B\bibinitperiod},
|
||
given={Geunyong},
|
||
giveni={G\bibinitperiod}}}%
|
||
{{hash=1f079894ae531411ed1de72354831c91}{%
|
||
family={Kwon},
|
||
familyi={K\bibinitperiod},
|
||
given={Junhyeong},
|
||
giveni={J\bibinitperiod}}}%
|
||
{{hash=5b2467e0abbadb6813f15043a1171386}{%
|
||
family={Baeg},
|
||
familyi={B\bibinitperiod},
|
||
given={Sanghyeon},
|
||
giveni={S\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Piscataway}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{IEEE}%
|
||
}
|
||
\strng{namehash}{0bdeb802bff85655b14b4864aea757ce}
|
||
\strng{fullhash}{eaa8d50f0a408c25fab46e0a4aafbb9f}
|
||
\strng{bibnamehash}{0bdeb802bff85655b14b4864aea757ce}
|
||
\strng{authorbibnamehash}{0bdeb802bff85655b14b4864aea757ce}
|
||
\strng{authornamehash}{0bdeb802bff85655b14b4864aea757ce}
|
||
\strng{authorfullhash}{eaa8d50f0a408c25fab46e0a4aafbb9f}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{2169-3536}
|
||
\field{journaltitle}{IEEE access}
|
||
\field{title}{DDR4 Data Channel Failure Due to DC Offset Caused by Intermittent Solder Ball Fracture in FBGA Package}
|
||
\field{volume}{9}
|
||
\field{year}{2021}
|
||
\true{nocite}
|
||
\field{pages}{63002\bibrangedash 63011}
|
||
\range{pages}{10}
|
||
\keyw{Capacitors ; Couplings ; Printed circuits}
|
||
\endentry
|
||
\entry{AGESA_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{1}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 8-May-2024]}
|
||
\field{title}{AGESA --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2023}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=AGESA&oldid=1166805057
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=AGESA&oldid=1166805057
|
||
\endverb
|
||
\endentry
|
||
\entry{psp_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{2}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{AMD Platform Security Processor --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=AMD_Platform_Security_Processor&oldid=1216563013
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=AMD_Platform_Security_Processor&oldid=1216563013
|
||
\endverb
|
||
\endentry
|
||
\entry{wiki_bios}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{3}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=BIOS&oldid=1240397019}}
|
||
\field{note}{[Online; accessed 16-August-2024]}
|
||
\field{title}{BIOS --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\endentry
|
||
\entry{DDR3_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{4}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 8-May-2024]}
|
||
\field{title}{DDR3 SDRAM --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=DDR3_SDRAM&oldid=1207641521
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=DDR3_SDRAM&oldid=1207641521
|
||
\endverb
|
||
\endentry
|
||
\entry{free_soft_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{5}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 30-January-2024]}
|
||
\field{title}{Free software --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Free_software&oldid=1196006316
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Free_software&oldid=1196006316
|
||
\endverb
|
||
\endentry
|
||
\entry{fsf_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{6}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{Free Software Foundation --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Free_Software_Foundation&oldid=1222269091
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Free_Software_Foundation&oldid=1222269091
|
||
\endverb
|
||
\endentry
|
||
\entry{fs_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{7}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 29-January-2024]}
|
||
\field{title}{Free software movement --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Free_software_movement&oldid=1197710495
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Free_software_movement&oldid=1197710495
|
||
\endverb
|
||
\endentry
|
||
\entry{gfdl_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{8}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 30-January-2024]}
|
||
\field{title}{GNU Free Documentation License --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_Free_Documentation_License&oldid=1193649968
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_Free_Documentation_License&oldid=1193649968
|
||
\endverb
|
||
\endentry
|
||
\entry{gpl_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{9}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 30-January-2024]}
|
||
\field{title}{GNU General Public License --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_General_Public_License&oldid=1199241605
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_General_Public_License&oldid=1199241605
|
||
\endverb
|
||
\endentry
|
||
\entry{grub_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{10}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{GNU GRUB --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_GRUB&oldid=1217643156
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_GRUB&oldid=1217643156
|
||
\endverb
|
||
\endentry
|
||
\entry{gnu_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{11}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{GNU Project --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_Project&oldid=1205139455
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=GNU_Project&oldid=1205139455
|
||
\endverb
|
||
\endentry
|
||
\entry{ime_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{12}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{Intel Management Engine --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=1216703991
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=1216703991
|
||
\endverb
|
||
\endentry
|
||
\entry{lip6_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{13}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{Laboratoire d'Informatique de Paris 6 --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Laboratoire_d%27Informatique_de_Paris_6&oldid=1222525180
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Laboratoire_d%27Informatique_de_Paris_6&oldid=1222525180
|
||
\endverb
|
||
\endentry
|
||
\entry{NDA_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{14}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 8-May-2024]}
|
||
\field{title}{Non-disclosure agreement --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2023}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Non-disclosure_agreement&oldid=1183749255
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=Non-disclosure_agreement&oldid=1183749255
|
||
\endverb
|
||
\endentry
|
||
\entry{northbridge_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{15}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=Northbridge_(computing)&oldid=1231509957}}
|
||
\field{note}{[Online; accessed 17-August-2024]}
|
||
\field{title}{Northbridge (computing) --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\endentry
|
||
\entry{openbmc_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{16}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 8-May-2024]}
|
||
\field{title}{OpenBMC --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2023}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=OpenBMC&oldid=1183698628
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=OpenBMC&oldid=1183698628
|
||
\endverb
|
||
\endentry
|
||
\entry{seabios_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{17}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{SeaBIOS --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2023}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=SeaBIOS&oldid=1179465237
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=SeaBIOS&oldid=1179465237
|
||
\endverb
|
||
\endentry
|
||
\entry{southbridge_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{18}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=Southbridge_(computing)&oldid=1239483618}}
|
||
\field{note}{[Online; accessed 17-August-2024]}
|
||
\field{title}{Southbridge (computing) --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\endentry
|
||
\entry{4freedom_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{19}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 29-January-2024]}
|
||
\field{title}{The Free Software Definition --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2023}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=The_Free_Software_Definition&oldid=1192713194
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=The_Free_Software_Definition&oldid=1192713194
|
||
\endverb
|
||
\endentry
|
||
\entry{osd_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{20}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 30-January-2024]}
|
||
\field{title}{The Open Source Definition --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2023}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=The_Open_Source_Definition&oldid=1191447775
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=The_Open_Source_Definition&oldid=1191447775
|
||
\endverb
|
||
\endentry
|
||
\entry{x86_wiki}{misc}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
|
||
family={{Wikipedia contributors}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
|
||
\field{extraname}{21}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{[Online; accessed 7-May-2024]}
|
||
\field{title}{X86 --- {Wikipedia}{,} The Free Encyclopedia}
|
||
\field{year}{2024}
|
||
\true{nocite}
|
||
\verb{urlraw}
|
||
\verb https://en.wikipedia.org/w/index.php?title=X86&oldid=1221800539
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://en.wikipedia.org/w/index.php?title=X86&oldid=1221800539
|
||
\endverb
|
||
\endentry
|
||
\entry{Wilcox2018}{article}{}
|
||
\true{moreauthor}
|
||
\true{morelabelname}
|
||
\name{author}{1}{}{%
|
||
{{hash=d915a447c9041e20fdda667e3b695b20}{%
|
||
family={Wilcox},
|
||
familyi={W\bibinitperiod},
|
||
given={J.},
|
||
giveni={J\bibinitperiod}}}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{IEEE}%
|
||
}
|
||
\strng{namehash}{87362f1ffa0b785aa0493de03bf223e6}
|
||
\strng{fullhash}{87362f1ffa0b785aa0493de03bf223e6}
|
||
\strng{bibnamehash}{87362f1ffa0b785aa0493de03bf223e6}
|
||
\strng{authorbibnamehash}{87362f1ffa0b785aa0493de03bf223e6}
|
||
\strng{authornamehash}{87362f1ffa0b785aa0493de03bf223e6}
|
||
\strng{authorfullhash}{87362f1ffa0b785aa0493de03bf223e6}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{Proceedings of the 2018 IEEE International Symposium on High-Performance Computer Architecture}
|
||
\field{title}{Understanding and Mitigating the Microcode Update Latency}
|
||
\field{year}{2018}
|
||
\field{pages}{234\bibrangedash 245}
|
||
\range{pages}{12}
|
||
\endentry
|
||
\entry{winbond}{manual}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=506790477fe03844712a0c66579f17d0}{%
|
||
family={{Winbond Electronics Corporation}},
|
||
familyi={W\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{506790477fe03844712a0c66579f17d0}
|
||
\strng{fullhash}{506790477fe03844712a0c66579f17d0}
|
||
\strng{bibnamehash}{506790477fe03844712a0c66579f17d0}
|
||
\strng{authorbibnamehash}{506790477fe03844712a0c66579f17d0}
|
||
\strng{authornamehash}{506790477fe03844712a0c66579f17d0}
|
||
\strng{authorfullhash}{506790477fe03844712a0c66579f17d0}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{note}{Accessed: 2024-08-17}
|
||
\field{title}{WINBOND W83667HG-A Datasheet}
|
||
\verb{urlraw}
|
||
\verb https://www.winbond.com/
|
||
\endverb
|
||
\verb{url}
|
||
\verb https://www.winbond.com/
|
||
\endverb
|
||
\endentry
|
||
\entry{wolf2006}{article}{}
|
||
\name{author}{1}{}{%
|
||
{{hash=e7ea35f3f0c3cf77495520fc0d8fdb22}{%
|
||
family={Wolf},
|
||
familyi={W\bibinitperiod},
|
||
given={K.},
|
||
giveni={K\bibinitperiod}}}%
|
||
}
|
||
\strng{namehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
|
||
\strng{fullhash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
|
||
\strng{bibnamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
|
||
\strng{authorbibnamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
|
||
\strng{authornamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
|
||
\strng{authorfullhash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
|
||
\field{sortinit}{W}
|
||
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{journaltitle}{IEEE Computer Society}
|
||
\field{number}{5}
|
||
\field{title}{Modern Boot Firmware: Moving from BIOS to UEFI}
|
||
\field{volume}{39}
|
||
\field{year}{2006}
|
||
\true{nocite}
|
||
\field{pages}{42\bibrangedash 47}
|
||
\range{pages}{6}
|
||
\verb{doi}
|
||
\verb 10.1109/MC.2006.156
|
||
\endverb
|
||
\endentry
|
||
\entry{YiJinhui2021DoDS}{article}{}
|
||
\name{author}{3}{}{%
|
||
{{hash=a738e2c330fa8bb553322676f86cdd67}{%
|
||
family={Yi},
|
||
familyi={Y\bibinitperiod},
|
||
given={Jinhui},
|
||
giveni={J\bibinitperiod}}}%
|
||
{{hash=1ec6f5d17a25af4f2091741966c18325}{%
|
||
family={Wang},
|
||
familyi={W\bibinitperiod},
|
||
given={Mingfu},
|
||
giveni={M\bibinitperiod}}}%
|
||
{{hash=90c8def289747c02c6ba0fa10c44c4d4}{%
|
||
family={Bai},
|
||
familyi={B\bibinitperiod},
|
||
given={Lidong},
|
||
giveni={L\bibinitperiod}}}%
|
||
}
|
||
\list{language}{1}{%
|
||
{eng}%
|
||
}
|
||
\list{location}{1}{%
|
||
{Bristol}%
|
||
}
|
||
\list{publisher}{1}{%
|
||
{IOP Publishing}%
|
||
}
|
||
\strng{namehash}{f0fa6bd8023def40891dba2f4d00ecb2}
|
||
\strng{fullhash}{f0fa6bd8023def40891dba2f4d00ecb2}
|
||
\strng{bibnamehash}{f0fa6bd8023def40891dba2f4d00ecb2}
|
||
\strng{authorbibnamehash}{f0fa6bd8023def40891dba2f4d00ecb2}
|
||
\strng{authornamehash}{f0fa6bd8023def40891dba2f4d00ecb2}
|
||
\strng{authorfullhash}{f0fa6bd8023def40891dba2f4d00ecb2}
|
||
\field{sortinit}{Y}
|
||
\field{sortinithash}{fd67ad5a9ef0f7456bdd9aab10fe1495}
|
||
\field{labelnamesource}{author}
|
||
\field{labeltitlesource}{title}
|
||
\field{issn}{1742-6588}
|
||
\field{journaltitle}{Journal of physics. Conference series}
|
||
\field{number}{1}
|
||
\field{title}{Design of DDR3 SDRAM read-write controller based on FPGA}
|
||
\field{volume}{1846}
|
||
\field{year}{2021}
|
||
\true{nocite}
|
||
\field{pages}{12046\bibrangedash}
|
||
\range{pages}{-1}
|
||
\keyw{Cameras ; Optical fibers ; Physics ; Realtime . . .}
|
||
\endentry
|
||
\enddatalist
|
||
\endrefsection
|
||
\endinput
|
||
|