hardware-init-review/hardware_init_review.bbl

3125 lines
124 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

% $ biblatex auxiliary file $
% $ biblatex bbl format version 3.2 $
% Do not modify the above lines!
%
% This is an auxiliary file used by the 'biblatex' package.
% This file may safely be deleted. It will be recreated by
% biber as required.
%
\begingroup
\makeatletter
\@ifundefined{ver@biblatex.sty}
{\@latex@error
{Missing 'biblatex' package}
{The bibliography requires the 'biblatex' package.}
\aftergroup\endinput}
{}
\endgroup
\refsection{0}
\datalist[entry]{nty/global//global/global}
\entry{acmcs2015}{article}{}
\name{author}{1}{}{%
{{hash=dd350c00debd90eb907e07a437681ea9}{%
family={ACMCS},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{dd350c00debd90eb907e07a437681ea9}
\strng{fullhash}{dd350c00debd90eb907e07a437681ea9}
\strng{bibnamehash}{dd350c00debd90eb907e07a437681ea9}
\strng{authorbibnamehash}{dd350c00debd90eb907e07a437681ea9}
\strng{authornamehash}{dd350c00debd90eb907e07a437681ea9}
\strng{authorfullhash}{dd350c00debd90eb907e07a437681ea9}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{ACM Computing Surveys}
\field{number}{4}
\field{title}{The Evolution of Firmware: BIOS to UEFI}
\field{volume}{47}
\field{year}{2015}
\field{pages}{55\bibrangedash 61}
\range{pages}{7}
\verb{doi}
\verb 10.1145/2766462
\endverb
\endentry
\entry{acpi_spec}{misc}{}
\name{author}{1}{}{%
{{hash=970d747229841c61b3c063fb45baa9e7}{%
family={ACPI},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{970d747229841c61b3c063fb45baa9e7}
\strng{fullhash}{970d747229841c61b3c063fb45baa9e7}
\strng{bibnamehash}{970d747229841c61b3c063fb45baa9e7}
\strng{authorbibnamehash}{970d747229841c61b3c063fb45baa9e7}
\strng{authornamehash}{970d747229841c61b3c063fb45baa9e7}
\strng{authorfullhash}{970d747229841c61b3c063fb45baa9e7}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.acpi.info/spec.htm}}
\field{note}{Accessed: 2024-07-05}
\field{title}{ACPI Specification}
\true{nocite}
\endentry
\entry{amd_chipsets}{misc}{}
\name{author}{1}{}{%
{{hash=ec549314e642f60d59af16514cec0835}{%
family={{Advanced Micro Devices (AMD)}},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{ec549314e642f60d59af16514cec0835}
\strng{fullhash}{ec549314e642f60d59af16514cec0835}
\strng{bibnamehash}{ec549314e642f60d59af16514cec0835}
\strng{authorbibnamehash}{ec549314e642f60d59af16514cec0835}
\strng{authornamehash}{ec549314e642f60d59af16514cec0835}
\strng{authorfullhash}{ec549314e642f60d59af16514cec0835}
\field{extraname}{1}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-17}
\field{title}{AMD Embedded Chipsets: SR5690 and SP5100}
\verb{urlraw}
\verb https://www.amd.com/en/products/embedded-chipsets
\endverb
\verb{url}
\verb https://www.amd.com/en/products/embedded-chipsets
\endverb
\endentry
\entry{amd_bsp}{manual}{}
\name{author}{1}{}{%
{{hash=ec549314e642f60d59af16514cec0835}{%
family={{Advanced Micro Devices (AMD)}},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{ec549314e642f60d59af16514cec0835}
\strng{fullhash}{ec549314e642f60d59af16514cec0835}
\strng{bibnamehash}{ec549314e642f60d59af16514cec0835}
\strng{authorbibnamehash}{ec549314e642f60d59af16514cec0835}
\strng{authornamehash}{ec549314e642f60d59af16514cec0835}
\strng{authorfullhash}{ec549314e642f60d59af16514cec0835}
\field{extraname}{2}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-17}
\field{title}{AMD Family 15h Models 30h-3Fh Processors BIOS and Kernel Developer's Guide}
\field{year}{2014}
\verb{urlraw}
\verb https://www.amd.com/system/files/TechDocs/48751_15h_Mod_30h-3Fh_BKDG.pdf
\endverb
\verb{url}
\verb https://www.amd.com/system/files/TechDocs/48751_15h_Mod_30h-3Fh_BKDG.pdf
\endverb
\endentry
\entry{altera2008}{inproceedings}{}
\name{author}{1}{}{%
{{hash=3eb79c14c66a46e93a0deec7cb61c135}{%
family={Altera®},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{3eb79c14c66a46e93a0deec7cb61c135}
\strng{fullhash}{3eb79c14c66a46e93a0deec7cb61c135}
\strng{bibnamehash}{3eb79c14c66a46e93a0deec7cb61c135}
\strng{authorbibnamehash}{3eb79c14c66a46e93a0deec7cb61c135}
\strng{authornamehash}{3eb79c14c66a46e93a0deec7cb61c135}
\strng{authorfullhash}{3eb79c14c66a46e93a0deec7cb61c135}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{number}{AN-520-1.0}
\field{title}{DDR3 SDRAM Memory Interface Termination and Layout Guidelines}
\field{year}{2008}
\true{nocite}
\endentry
\entry{amd_ddr3_guide}{manual}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={{AMD}},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{1}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Available at AMD Developer Central}
\field{title}{AMD DDR3 Memory Controller: Technical Overview}
\field{year}{2011}
\verb{urlraw}
\verb https://developer.amd.com/
\endverb
\verb{url}
\verb https://developer.amd.com/
\endverb
\endentry
\entry{amd_6200}{manual}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={{AMD}},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{2}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Available at AMD Developer Central}
\field{title}{AMD Opteron 6200 Series Processor}
\field{year}{2011}
\verb{urlraw}
\verb https://developer.amd.com/
\endverb
\verb{url}
\verb https://developer.amd.com/
\endverb
\endentry
\entry{amd_psp}{misc}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={{AMD}},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{3}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.amd.com/en/technologies/security}}
\field{note}{Accessed: 2024-07-05}
\field{title}{AMD Platform Security Processor (PSP)}
\true{nocite}
\endentry
\entry{BKDG}{inbook}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={AMD},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{4}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{01}
\field{number}{42301}
\field{title}{BIOS and Kernel Developers Guide (BKDG) for AMD Family 15h Models 00h-0Fh Processors Rev 3.14}
\field{year}{2013}
\endentry
\entry{amd_ht_guide}{manual}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={{AMD}},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{5}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Available at AMD Developer Central}
\field{title}{HyperTransport Technology: Technical Overview}
\field{year}{2011}
\true{nocite}
\verb{urlraw}
\verb https://developer.amd.com/
\endverb
\verb{url}
\verb https://developer.amd.com/
\endverb
\endentry
\entry{SR5690BDG}{inbook}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={AMD},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{6}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{11}
\field{number}{43870}
\field{title}{SR5690/5670/5650 BIOS Developers Guide 3.00}
\field{year}{2010}
\endentry
\entry{SR5690RPR}{inbook}{}
\name{author}{1}{}{%
{{hash=48af4341f745163f945fa838eeabb062}{%
family={AMD},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{48af4341f745163f945fa838eeabb062}
\strng{fullhash}{48af4341f745163f945fa838eeabb062}
\strng{bibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorbibnamehash}{48af4341f745163f945fa838eeabb062}
\strng{authornamehash}{48af4341f745163f945fa838eeabb062}
\strng{authorfullhash}{48af4341f745163f945fa838eeabb062}
\field{extraname}{7}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{08}
\field{number}{43872}
\field{title}{SR5690/5670/5650 Register Programming Requirements 3.05}
\field{year}{2012}
\true{nocite}
\endentry
\entry{anderson_2018}{misc}{}
\name{author}{1}{}{%
{{hash=d582579a02c17863648cd49b1c91560b}{%
family={Anderson},
familyi={A\bibinitperiod},
given={T.},
giveni={T\bibinitperiod}}}%
}
\strng{namehash}{d582579a02c17863648cd49b1c91560b}
\strng{fullhash}{d582579a02c17863648cd49b1c91560b}
\strng{bibnamehash}{d582579a02c17863648cd49b1c91560b}
\strng{authorbibnamehash}{d582579a02c17863648cd49b1c91560b}
\strng{authornamehash}{d582579a02c17863648cd49b1c91560b}
\strng{authorfullhash}{d582579a02c17863648cd49b1c91560b}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.pcworld.com/article/3171322/bios-vs-uefi-understanding-the-modern-boot-environment.html}}
\field{title}{BIOS vs. UEFI: Understanding the Modern Boot Environment}
\field{year}{2018}
\endentry
\entry{ibm_pc}{misc}{}
\name{author}{1}{}{%
{{hash=f374c5f07cf19169f9b9d346dd5dc48b}{%
family={Archives},
familyi={A\bibinitperiod},
given={IBM},
giveni={I\bibinitperiod}}}%
}
\strng{namehash}{f374c5f07cf19169f9b9d346dd5dc48b}
\strng{fullhash}{f374c5f07cf19169f9b9d346dd5dc48b}
\strng{bibnamehash}{f374c5f07cf19169f9b9d346dd5dc48b}
\strng{authorbibnamehash}{f374c5f07cf19169f9b9d346dd5dc48b}
\strng{authornamehash}{f374c5f07cf19169f9b9d346dd5dc48b}
\strng{authorfullhash}{f374c5f07cf19169f9b9d346dd5dc48b}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.ibm.com/history/personal-computer}}
\field{title}{IBM Personal Computer}
\field{year}{2024}
\endentry
\entry{asus_kgpe_d16_manual}{manual}{}
\name{author}{1}{}{%
{{hash=cb6ab3315634a1e4d11b091ba48b60ba}{%
family={Asus},
familyi={A\bibinitperiod}}}%
}
\strng{namehash}{cb6ab3315634a1e4d11b091ba48b60ba}
\strng{fullhash}{cb6ab3315634a1e4d11b091ba48b60ba}
\strng{bibnamehash}{cb6ab3315634a1e4d11b091ba48b60ba}
\strng{authorbibnamehash}{cb6ab3315634a1e4d11b091ba48b60ba}
\strng{authornamehash}{cb6ab3315634a1e4d11b091ba48b60ba}
\strng{authorfullhash}{cb6ab3315634a1e4d11b091ba48b60ba}
\field{sortinit}{A}
\field{sortinithash}{2f401846e2029bad6b3ecc16d50031e2}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.asus.com/Commercial-Servers-Workstations/KGPE-D16/HelpDesk_Manual/}}
\field{note}{Accessed: 2024-07-05}
\field{title}{Asus KGPE-D16 Mainboard Documentation and User Manuals}
\true{nocite}
\endentry
\entry{BashunVladimir2013Tytb}{inproceedings}{}
\name{author}{4}{}{%
{{hash=4a5038a2f4919d18f44c606b5fbdb93d}{%
family={Bashun},
familyi={B\bibinitperiod},
given={Vladimir},
giveni={V\bibinitperiod}}}%
{{hash=0ea851562b66de79b6cc110c50262139}{%
family={Sergeev},
familyi={S\bibinitperiod},
given={Anton},
giveni={A\bibinitperiod}}}%
{{hash=333cc37093d65377f9615effb666f734}{%
family={Minchenkov},
familyi={M\bibinitperiod},
given={Victor},
giveni={V\bibinitperiod}}}%
{{hash=158ad3101768b62c909a2c0a1492121b}{%
family={Yakovlev},
familyi={Y\bibinitperiod},
given={Alexandr},
giveni={A\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{publisher}{1}{%
{FRUCT Oy}%
}
\strng{namehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
\strng{fullhash}{0504a7a243df533003b0e6f52f3a4cbb}
\strng{bibnamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
\strng{authorbibnamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
\strng{authornamehash}{2d65161a114de8ffb4c4c9e2d42eb7e2}
\strng{authorfullhash}{0504a7a243df533003b0e6f52f3a4cbb}
\field{sortinit}{B}
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{14th Conference of Open Innovation Association FRUCT}
\field{isbn}{1479949779}
\field{issn}{2305-7254}
\field{number}{14}
\field{title}{Too young to be secure: Analysis of UEFI threats and vulnerabilities}
\field{volume}{232}
\field{year}{2013}
\true{nocite}
\field{pages}{16\bibrangedash 24}
\range{pages}{9}
\keyw{Hardware ; Microprogramming}
\endentry
\entry{brown2003linuxbios}{inproceedings}{}
\true{moreauthor}
\true{morelabelname}
\name{author}{1}{}{%
{{hash=6d5fbc7b030fdbbd1911745166f16173}{%
family={Brown},
familyi={B\bibinitperiod},
given={R.\bibnamedelimi E.},
giveni={R\bibinitperiod\bibinitdelim E\bibinitperiod}}}%
}
\strng{namehash}{04c51642671734d12e40a8fa99413da3}
\strng{fullhash}{04c51642671734d12e40a8fa99413da3}
\strng{bibnamehash}{04c51642671734d12e40a8fa99413da3}
\strng{authorbibnamehash}{04c51642671734d12e40a8fa99413da3}
\strng{authornamehash}{04c51642671734d12e40a8fa99413da3}
\strng{authorfullhash}{04c51642671734d12e40a8fa99413da3}
\field{sortinit}{B}
\field{sortinithash}{d7095fff47cda75ca2589920aae98399}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of the 2003 Linux Symposium}
\field{title}{LinuxBIOS as an Open-Source Firmware Alternative}
\field{year}{2003}
\endentry
\entry{chang2013}{article}{}
\name{author}{2}{}{%
{{hash=701500fa4f83c75c8ce39152916ce4e4}{%
family={Chang},
familyi={C\bibinitperiod},
given={H.},
giveni={H\bibinitperiod}}}%
{{hash=f5ad93423c3c7f823659822ec5c53567}{%
family={Smith},
familyi={S\bibinitperiod},
given={A.},
giveni={A\bibinitperiod}}}%
}
\strng{namehash}{264aea26982367258ae277f4cc9fa221}
\strng{fullhash}{264aea26982367258ae277f4cc9fa221}
\strng{bibnamehash}{264aea26982367258ae277f4cc9fa221}
\strng{authorbibnamehash}{264aea26982367258ae277f4cc9fa221}
\strng{authornamehash}{264aea26982367258ae277f4cc9fa221}
\strng{authorfullhash}{264aea26982367258ae277f4cc9fa221}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{International Journal of Information Security}
\field{number}{3}
\field{title}{UEFI Secure Boot in Modern Computing}
\field{volume}{12}
\field{year}{2013}
\field{pages}{231\bibrangedash 241}
\range{pages}{11}
\verb{doi}
\verb 10.1007/s10207-013-0191-1
\endverb
\endentry
\entry{ChengKaixing2021TOWo}{article}{}
\name{author}{4}{}{%
{{hash=87e95c9cd0e83c710aef63227be51556}{%
family={Cheng},
familyi={C\bibinitperiod},
given={Kaixing},
giveni={K\bibinitperiod}}}%
{{hash=ab6761e53ea7e208d052bb326c60a591}{%
family={Luo},
familyi={L\bibinitperiod},
given={Zhongqiang},
giveni={Z\bibinitperiod}}}%
{{hash=d36c068c70cdd51ab157707f650f61bd}{%
family={Xiong},
familyi={X\bibinitperiod},
given={Xingzhong},
giveni={X\bibinitperiod}}}%
{{hash=f68e00e53402fcf8f0b2d36b636a13f7}{%
family={Wei},
familyi={W\bibinitperiod},
given={Xiaohan},
giveni={X\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{location}{1}{%
{Warsaw}%
}
\list{publisher}{1}{%
{Polish Academy of Sciences}%
}
\strng{namehash}{817b54c9451b3142d9599daf5c62743a}
\strng{fullhash}{7ec50c9638fcc2077922aca6c3c1a162}
\strng{bibnamehash}{817b54c9451b3142d9599daf5c62743a}
\strng{authorbibnamehash}{817b54c9451b3142d9599daf5c62743a}
\strng{authornamehash}{817b54c9451b3142d9599daf5c62743a}
\strng{authorfullhash}{7ec50c9638fcc2077922aca6c3c1a162}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{2081-8491}
\field{journaltitle}{International Journal of Electronics and Telecommunications}
\field{number}{3}
\field{title}{Two Optimization Ways of DDR3 Transmission Line Equal-Length Wiring Based on Signal Integrity}
\field{volume}{67}
\field{year}{2021}
\true{nocite}
\field{pages}{385\bibrangedash 394}
\range{pages}{10}
\keyw{Crosstalk ; Design ; Electric lines ; Electronic circuits ; Optimal designs (Statistics) ; Printed circuits ; Telecommunication lines}
\endentry
\entry{ChevalierRonny2017CBMA}{inproceedings}{}
\name{author}{4}{}{%
{{hash=e3838e961a75d380f57305816860be14}{%
family={Chevalier},
familyi={C\bibinitperiod},
given={Ronny},
giveni={R\bibinitperiod}}}%
{{hash=79ef26f7c6cc9bdb0662b770ffff087e}{%
family={Villatel},
familyi={V\bibinitperiod},
given={Maugan},
giveni={M\bibinitperiod}}}%
{{hash=3f349c38e0bf643a4c718ce0de9adff7}{%
family={Plaquin},
familyi={P\bibinitperiod},
given={David},
giveni={D\bibinitperiod}}}%
{{hash=72305a66e62a613c6b8f457c34d60a37}{%
family={Hiet},
familyi={H\bibinitperiod},
given={Guillaume},
giveni={G\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{publisher}{1}{%
{ACM}%
}
\strng{namehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
\strng{fullhash}{c9ed3e65bcc94b7daf77a3092cf55b3e}
\strng{bibnamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
\strng{authorbibnamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
\strng{authornamehash}{6927d84d96fd6fbf87369d2d6b4a5ed2}
\strng{authorfullhash}{c9ed3e65bcc94b7daf77a3092cf55b3e}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode}
\field{volume}{2017}
\field{year}{2017}
\true{nocite}
\field{pages}{399\bibrangedash 411}
\range{pages}{13}
\keyw{Computer science}
\endentry
\entry{intel_acpi_spec}{book}{}
\name{author}{1}{}{%
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
family={Corporation},
familyi={C\bibinitperiod},
given={Intel},
giveni={I\bibinitperiod}}}%
}
\list{publisher}{1}{%
{Intel Corporation}%
}
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
\field{extraname}{1}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Advanced Configuration and Power Interface (ACPI) Specification}
\field{year}{1996}
\verb{urlraw}
\verb https://uefi.org/specifications
\endverb
\verb{url}
\verb https://uefi.org/specifications
\endverb
\endentry
\entry{intel_csme}{report}{}
\name{author}{1}{}{%
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
family={Corporation},
familyi={C\bibinitperiod},
given={Intel},
giveni={I\bibinitperiod}}}%
}
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
\field{extraname}{2}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Intel Converged Security and Management Engine (CSME) Security White Paper}
\field{type}{techreport}
\field{year}{2020}
\verb{urlraw}
\verb https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf
\endverb
\verb{url}
\verb https://www.intel.com/content/dam/www/public/us/en/security-advisory/documents/intel-csme-security-white-paper.pdf
\endverb
\endentry
\entry{intel_smm}{report}{}
\name{author}{1}{}{%
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
family={Corporation},
familyi={C\bibinitperiod},
given={Intel},
giveni={I\bibinitperiod}}}%
}
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
\field{extraname}{3}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{System Management Mode}
\field{type}{techreport}
\field{year}{2016}
\true{nocite}
\verb{urlraw}
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/system-management-mode.html
\endverb
\verb{url}
\verb https://www.intel.com/content/www/us/en/developer/articles/technical/system-management-mode.html
\endverb
\endentry
\entry{intel_uefi}{misc}{}
\name{author}{1}{}{%
{{hash=42af28f239d9ce2a4d0f9a032741150e}{%
family={Corporation},
familyi={C\bibinitperiod},
given={Intel},
giveni={I\bibinitperiod}}}%
}
\strng{namehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{fullhash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{bibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorbibnamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authornamehash}{42af28f239d9ce2a4d0f9a032741150e}
\strng{authorfullhash}{42af28f239d9ce2a4d0f9a032741150e}
\field{extraname}{4}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.intel.com/content/www/us/en/architecture-and-technology/unified-extensible-firmware-interface.html}}
\field{title}{Unified Extensible Firmware Interface (UEFI)}
\field{year}{2020}
\endentry
\entry{microsoft_uefi}{misc}{}
\name{author}{1}{}{%
{{hash=91da9dc9e484daf8dc9ed72055907025}{%
family={Corporation},
familyi={C\bibinitperiod},
given={Microsoft},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{91da9dc9e484daf8dc9ed72055907025}
\strng{fullhash}{91da9dc9e484daf8dc9ed72055907025}
\strng{bibnamehash}{91da9dc9e484daf8dc9ed72055907025}
\strng{authorbibnamehash}{91da9dc9e484daf8dc9ed72055907025}
\strng{authornamehash}{91da9dc9e484daf8dc9ed72055907025}
\strng{authorfullhash}{91da9dc9e484daf8dc9ed72055907025}
\field{extraname}{5}
\field{sortinit}{C}
\field{sortinithash}{4d103a86280481745c9c897c925753c0}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://docs.microsoft.com/en-us/windows-hardware/drivers/bringup/uefi-firmware}}
\field{title}{UEFI Firmware}
\field{year}{2019}
\endentry
\entry{domas2015}{article}{}
\name{author}{1}{}{%
{{hash=e063217a45afb6221ff3c567a914f9c6}{%
family={Domas},
familyi={D\bibinitperiod},
given={Christopher},
giveni={C\bibinitperiod}}}%
}
\strng{namehash}{e063217a45afb6221ff3c567a914f9c6}
\strng{fullhash}{e063217a45afb6221ff3c567a914f9c6}
\strng{bibnamehash}{e063217a45afb6221ff3c567a914f9c6}
\strng{authorbibnamehash}{e063217a45afb6221ff3c567a914f9c6}
\strng{authornamehash}{e063217a45afb6221ff3c567a914f9c6}
\strng{authorfullhash}{e063217a45afb6221ff3c567a914f9c6}
\field{sortinit}{D}
\field{sortinithash}{6f385f66841fb5e82009dc833c761848}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Black Hat USA}
\field{title}{The Memory Sinkhole - Unleashing an x86 Design Flaw Allowing Universal Privilege Escalation}
\field{year}{2015}
\verb{urlraw}
\verb https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf
\endverb
\verb{url}
\verb https://www.blackhat.com/docs/us-15/materials/us-15-Domas-The-Memory-Sinkhole-Unleashing-An-x86-Design-Flaw-Allowing-Universal-Privilege-Escalation-wp.pdf
\endverb
\endentry
\entry{EmbletonShawn2013Sran}{article}{}
\name{author}{3}{}{%
{{hash=3b28637e31b5ac5e8b5e6d0d47dbf1c8}{%
family={Embleton},
familyi={E\bibinitperiod},
given={Shawn},
giveni={S\bibinitperiod}}}%
{{hash=d4614bca4697f3204b4fb2065b3aa398}{%
family={Sparks},
familyi={S\bibinitperiod},
given={Sherri},
giveni={S\bibinitperiod}}}%
{{hash=b77acdf6b74461ff6a92af7a7d440fa3}{%
family={Zou},
familyi={Z\bibinitperiod},
given={Cliff\bibnamedelima C.},
giveni={C\bibinitperiod\bibinitdelim C\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{location}{1}{%
{London}%
}
\list{publisher}{1}{%
{Blackwell Publishing Ltd}%
}
\strng{namehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
\strng{fullhash}{9b0a73761fbcedfbdb8adb9d212d86b4}
\strng{bibnamehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
\strng{authorbibnamehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
\strng{authornamehash}{9b0a73761fbcedfbdb8adb9d212d86b4}
\strng{authorfullhash}{9b0a73761fbcedfbdb8adb9d212d86b4}
\field{sortinit}{E}
\field{sortinithash}{8da8a182d344d5b9047633dfc0cc9131}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{1939-0114}
\field{journaltitle}{Security and communication networks}
\field{number}{12}
\field{title}{SMM rootkit: a new breed of OS independent malware}
\field{volume}{6}
\field{year}{2013}
\true{nocite}
\field{pages}{1590\bibrangedash 1605}
\range{pages}{16}
\endentry
\entry{ErmolovMarkM.2022Uxit}{article}{}
\name{author}{3}{}{%
{{hash=3055d85c35b8ec376b72c37aee6c5dc7}{%
family={Ermolov},
familyi={E\bibinitperiod},
given={Mark\bibnamedelima M.},
giveni={M\bibinitperiod\bibinitdelim M\bibinitperiod}}}%
{{hash=c57c726603ec1f6560c829a62c0f06cd}{%
family={Sklyarov},
familyi={S\bibinitperiod},
given={Dmitry\bibnamedelima V.},
giveni={D\bibinitperiod\bibinitdelim V\bibinitperiod}}}%
{{hash=5e1e5a24ce4665215ba4b95331fc2169}{%
family={Goryachy},
familyi={G\bibinitperiod},
given={Maxim\bibnamedelima S.},
giveni={M\bibinitperiod\bibinitdelim S\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{publisher}{2}{%
{Joint Stock Company "Experimental Scientific}%
{Production Association SPELS}%
}
\strng{namehash}{1e472da30097e5e57577602911d0c81a}
\strng{fullhash}{1e472da30097e5e57577602911d0c81a}
\strng{bibnamehash}{1e472da30097e5e57577602911d0c81a}
\strng{authorbibnamehash}{1e472da30097e5e57577602911d0c81a}
\strng{authornamehash}{1e472da30097e5e57577602911d0c81a}
\strng{authorfullhash}{1e472da30097e5e57577602911d0c81a}
\field{sortinit}{E}
\field{sortinithash}{8da8a182d344d5b9047633dfc0cc9131}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{2074-7128}
\field{journaltitle}{Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ}
\field{number}{4}
\field{title}{Undocumented x86 instructions to control the CPU at the microarchitecture level in modern INTEL processors}
\field{volume}{29}
\field{year}{2022}
\true{nocite}
\field{pages}{27\bibrangedash 41}
\range{pages}{15}
\endentry
\entry{uefi_spec}{misc}{}
\name{author}{1}{}{%
{{hash=c4a3e6668448f707c96f886df3346fc0}{%
family={Forum},
familyi={F\bibinitperiod},
given={UEFI},
giveni={U\bibinitperiod}}}%
}
\strng{namehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{fullhash}{c4a3e6668448f707c96f886df3346fc0}
\strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0}
\field{extraname}{1}
\field{sortinit}{F}
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://uefi.org/specifications}}
\field{title}{UEFI Specification}
\field{year}{2021}
\endentry
\entry{uefi}{misc}{}
\name{author}{1}{}{%
{{hash=c4a3e6668448f707c96f886df3346fc0}{%
family={Forum},
familyi={F\bibinitperiod},
given={UEFI},
giveni={U\bibinitperiod}}}%
}
\strng{namehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{fullhash}{c4a3e6668448f707c96f886df3346fc0}
\strng{bibnamehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{authorbibnamehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{authornamehash}{c4a3e6668448f707c96f886df3346fc0}
\strng{authorfullhash}{c4a3e6668448f707c96f886df3346fc0}
\field{extraname}{2}
\field{sortinit}{F}
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://uefi.org/}}
\field{title}{Unified Extensible Firmware Interface}
\field{year}{2024}
\true{nocite}
\endentry
\entry{coprocessor_smm_monitoring}{article}{}
\true{moreauthor}
\true{morelabelname}
\name{author}{1}{}{%
{{hash=905dd1958bf443fbba3af917505aca40}{%
family={Francillon},
familyi={F\bibinitperiod},
given={Aurelien},
giveni={A\bibinitperiod}}}%
}
\strng{namehash}{b5a25eafffa389330f5e5e7c6f486e81}
\strng{fullhash}{b5a25eafffa389330f5e5e7c6f486e81}
\strng{bibnamehash}{b5a25eafffa389330f5e5e7c6f486e81}
\strng{authorbibnamehash}{b5a25eafffa389330f5e5e7c6f486e81}
\strng{authornamehash}{b5a25eafffa389330f5e5e7c6f486e81}
\strng{authorfullhash}{b5a25eafffa389330f5e5e7c6f486e81}
\field{sortinit}{F}
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{arXiv}
\field{title}{Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode}
\field{year}{2018}
\true{nocite}
\verb{urlraw}
\verb https://arxiv.org/abs/1803.02700
\endverb
\verb{url}
\verb https://arxiv.org/abs/1803.02700
\endverb
\endentry
\entry{fsf_ryf}{misc}{}
\name{author}{1}{}{%
{{hash=cb96118d65be9f05ad10bd5cfdaf0f6d}{%
family={{Free Software Foundation}},
familyi={F\bibinitperiod}}}%
}
\strng{namehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
\strng{fullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
\strng{bibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
\strng{authorbibnamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
\strng{authornamehash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
\strng{authorfullhash}{cb96118d65be9f05ad10bd5cfdaf0f6d}
\field{sortinit}{F}
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-17}
\field{title}{Respects Your Freedom (RYF) Certification}
\field{year}{2017}
\verb{urlraw}
\verb https://ryf.fsf.org/products/VikingsD16
\endverb
\verb{url}
\verb https://ryf.fsf.org/products/VikingsD16
\endverb
\endentry
\entry{freiberger2000fire}{book}{}
\name{author}{2}{}{%
{{hash=d3ab7b5c9a381bafc1c1c3eb700a3667}{%
family={Freiberger},
familyi={F\bibinitperiod},
given={Paul},
giveni={P\bibinitperiod}}}%
{{hash=e5ca5deb8cf29fc68cc22b811f14ffe5}{%
family={Swaine},
familyi={S\bibinitperiod},
given={Michael},
giveni={M\bibinitperiod}}}%
}
\list{publisher}{1}{%
{McGraw-Hill}%
}
\strng{namehash}{ca99d1758e4beb9842f62e3a5c030576}
\strng{fullhash}{ca99d1758e4beb9842f62e3a5c030576}
\strng{bibnamehash}{ca99d1758e4beb9842f62e3a5c030576}
\strng{authorbibnamehash}{ca99d1758e4beb9842f62e3a5c030576}
\strng{authornamehash}{ca99d1758e4beb9842f62e3a5c030576}
\strng{authorfullhash}{ca99d1758e4beb9842f62e3a5c030576}
\field{sortinit}{F}
\field{sortinithash}{2638baaa20439f1b5a8f80c6c08a13b4}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Fire in the Valley: The Birth and Death of the Personal Computer}
\field{year}{2000}
\endentry
\entry{blackhat_me_hack}{article}{}
\name{author}{2}{}{%
{{hash=e450be1043f8bd6abbfc1a479f2d7700}{%
family={Goryachy},
familyi={G\bibinitperiod},
given={Maxim},
giveni={M\bibinitperiod}}}%
{{hash=1d6029a2369e520927fdca29718123a0}{%
family={Ermolov},
familyi={E\bibinitperiod},
given={Mark},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{6053ddd30f543c5477a5425e5b6b645a}
\strng{fullhash}{6053ddd30f543c5477a5425e5b6b645a}
\strng{bibnamehash}{6053ddd30f543c5477a5425e5b6b645a}
\strng{authorbibnamehash}{6053ddd30f543c5477a5425e5b6b645a}
\strng{authornamehash}{6053ddd30f543c5477a5425e5b6b645a}
\strng{authorfullhash}{6053ddd30f543c5477a5425e5b6b645a}
\field{sortinit}{G}
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Black Hat Europe}
\field{title}{How to Hack a Turned Off Computer, or Running Unsigned Code in Intel Management Engine}
\field{year}{2017}
\field{pages}{1\bibrangedash 23}
\range{pages}{23}
\verb{urlraw}
\verb https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf
\endverb
\verb{url}
\verb https://www.blackhat.com/docs/eu-17/materials/eu-17-Goryachy-How-To-Hack-A-Turned-Off-Computer-Or-Running-Unsigned-Code-In-Intel-Management-Engine-wp.pdf
\endverb
\endentry
\entry{grewal_ibm_pc}{misc}{}
\name{author}{1}{}{%
{{hash=4296abffda91fa0c8d79d848107a62ed}{%
family={Grewal},
familyi={G\bibinitperiod},
given={Jimmy},
giveni={J\bibinitperiod}}}%
}
\strng{namehash}{4296abffda91fa0c8d79d848107a62ed}
\strng{fullhash}{4296abffda91fa0c8d79d848107a62ed}
\strng{bibnamehash}{4296abffda91fa0c8d79d848107a62ed}
\strng{authorbibnamehash}{4296abffda91fa0c8d79d848107a62ed}
\strng{authornamehash}{4296abffda91fa0c8d79d848107a62ed}
\strng{authorfullhash}{4296abffda91fa0c8d79d848107a62ed}
\field{sortinit}{G}
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{Armonk Institute}
\field{title}{The Creation of the IBM PC}
\field{year}{2024}
\endentry
\entry{acpi_os_support}{article}{}
\name{author}{1}{}{%
{{hash=d41895e4fca09a2ffb0c95190f6d6aca}{%
family={Gschwind},
familyi={G\bibinitperiod},
given={Michael},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{d41895e4fca09a2ffb0c95190f6d6aca}
\strng{fullhash}{d41895e4fca09a2ffb0c95190f6d6aca}
\strng{bibnamehash}{d41895e4fca09a2ffb0c95190f6d6aca}
\strng{authorbibnamehash}{d41895e4fca09a2ffb0c95190f6d6aca}
\strng{authornamehash}{d41895e4fca09a2ffb0c95190f6d6aca}
\strng{authorfullhash}{d41895e4fca09a2ffb0c95190f6d6aca}
\field{sortinit}{G}
\field{sortinithash}{32d67eca0634bf53703493fb1090a2e8}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{IEEE Micro}
\field{title}{Advanced Configuration and Power Interface: The Operating System Perspective}
\field{volume}{20}
\field{year}{2000}
\field{pages}{82\bibrangedash 89}
\range{pages}{8}
\verb{doi}
\verb 10.1109/40.888702
\endverb
\endentry
\entry{HaiYa2024Awah}{article}{}
\name{author}{5}{}{%
{{hash=82476f74d1aa84fe5485d95cc0300627}{%
family={Hai},
familyi={H\bibinitperiod},
given={Ya},
giveni={Y\bibinitperiod}}}%
{{hash=0138deaf332692ced30d823b9cebc488}{%
family={Liu},
familyi={L\bibinitperiod},
given={Fei},
giveni={F\bibinitperiod}}}%
{{hash=b2fd4f53b1682ad08d45675c5176cc23}{%
family={Wang},
familyi={W\bibinitperiod},
given={Yongshan},
giveni={Y\bibinitperiod}}}%
{{hash=64c07533f16224f4ccf4b077a5c83862}{%
family={Fu},
familyi={F\bibinitperiod},
given={Liyin},
giveni={L\bibinitperiod}}}%
{{hash=e731d63b9ff656be7ffed30b9350e444}{%
family={Huo},
familyi={H\bibinitperiod},
given={Jian},
giveni={J\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{publisher}{1}{%
{Elsevier Ltd}%
}
\strng{namehash}{4342b97637f2f5c989781de1c21b5b75}
\strng{fullhash}{69b66a3731899e73435dc338915031a4}
\strng{bibnamehash}{4342b97637f2f5c989781de1c21b5b75}
\strng{authorbibnamehash}{4342b97637f2f5c989781de1c21b5b75}
\strng{authornamehash}{4342b97637f2f5c989781de1c21b5b75}
\strng{authorfullhash}{69b66a3731899e73435dc338915031a4}
\field{sortinit}{H}
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{1879-2391}
\field{journaltitle}{Microelectronics}
\field{title}{A wide-frequency and high-precision ZQ calibration circuit for NAND Flash memory}
\field{volume}{143}
\field{year}{2024}
\true{nocite}
\field{pages}{106051\bibrangedash}
\range{pages}{-1}
\endentry
\entry{heasman2007}{article}{}
\name{author}{1}{}{%
{{hash=433d3e3ec136bfc723af40458ccae9c5}{%
family={Heasman},
familyi={H\bibinitperiod},
given={John},
giveni={J\bibinitperiod}}}%
}
\strng{namehash}{433d3e3ec136bfc723af40458ccae9c5}
\strng{fullhash}{433d3e3ec136bfc723af40458ccae9c5}
\strng{bibnamehash}{433d3e3ec136bfc723af40458ccae9c5}
\strng{authorbibnamehash}{433d3e3ec136bfc723af40458ccae9c5}
\strng{authornamehash}{433d3e3ec136bfc723af40458ccae9c5}
\strng{authorfullhash}{433d3e3ec136bfc723af40458ccae9c5}
\field{sortinit}{H}
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Black Hat USA}
\field{title}{Implementing and Detecting an ACPI BIOS Rootkit}
\field{year}{2007}
\verb{urlraw}
\verb https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf
\endverb
\verb{url}
\verb https://www.blackhat.com/presentations/bh-usa-07/Heasman/Presentation/bh-usa-07-heasman.pdf
\endverb
\endentry
\entry{hill_impact_caching}{article}{}
\name{author}{2}{}{%
{{hash=c5fd1af61abfb4398ded7625bf0ea46f}{%
family={Hill},
familyi={H\bibinitperiod},
given={M.\bibnamedelimi D.},
giveni={M\bibinitperiod\bibinitdelim D\bibinitperiod}}}%
{{hash=2d42b38cfbd98455927c6acaf50b3c5e}{%
family={Marty},
familyi={M\bibinitperiod},
given={M.\bibnamedelimi R.},
giveni={M\bibinitperiod\bibinitdelim R\bibinitperiod}}}%
}
\list{publisher}{1}{%
{ACM}%
}
\strng{namehash}{747d589c93ffb32b514aaefd75b1a4ce}
\strng{fullhash}{747d589c93ffb32b514aaefd75b1a4ce}
\strng{bibnamehash}{747d589c93ffb32b514aaefd75b1a4ce}
\strng{authorbibnamehash}{747d589c93ffb32b514aaefd75b1a4ce}
\strng{authornamehash}{747d589c93ffb32b514aaefd75b1a4ce}
\strng{authorfullhash}{747d589c93ffb32b514aaefd75b1a4ce}
\field{sortinit}{H}
\field{sortinithash}{23a3aa7c24e56cfa16945d55545109b5}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Communications of the ACM}
\field{number}{12}
\field{title}{The Impact of Caching on Multicore Performance}
\field{volume}{51}
\field{year}{2008}
\field{pages}{48\bibrangedash 54}
\range{pages}{7}
\endentry
\entry{micron_ddr3}{manual}{}
\name{author}{1}{}{%
{{hash=bb9782d6d5d1c95c67b7b316cc17615a}{%
family={Inc},
familyi={I\bibinitperiod},
given={Micron\bibnamedelima Technology},
giveni={M\bibinitperiod\bibinitdelim T\bibinitperiod}}}%
}
\strng{namehash}{bb9782d6d5d1c95c67b7b316cc17615a}
\strng{fullhash}{bb9782d6d5d1c95c67b7b316cc17615a}
\strng{bibnamehash}{bb9782d6d5d1c95c67b7b316cc17615a}
\strng{authorbibnamehash}{bb9782d6d5d1c95c67b7b316cc17615a}
\strng{authornamehash}{bb9782d6d5d1c95c67b7b316cc17615a}
\strng{authorfullhash}{bb9782d6d5d1c95c67b7b316cc17615a}
\field{sortinit}{I}
\field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{number}{TN-41-02}
\field{title}{Technical Note: DDR3 ZQ Calibration}
\field{year}{2008}
\true{nocite}
\endentry
\entry{intel_me}{misc}{}
\name{author}{1}{}{%
{{hash=b7f0fb90e404efb48f8a85a517dec3c9}{%
family={{Intel Corporation}},
familyi={I\bibinitperiod}}}%
}
\strng{namehash}{b7f0fb90e404efb48f8a85a517dec3c9}
\strng{fullhash}{b7f0fb90e404efb48f8a85a517dec3c9}
\strng{bibnamehash}{b7f0fb90e404efb48f8a85a517dec3c9}
\strng{authorbibnamehash}{b7f0fb90e404efb48f8a85a517dec3c9}
\strng{authornamehash}{b7f0fb90e404efb48f8a85a517dec3c9}
\strng{authorfullhash}{b7f0fb90e404efb48f8a85a517dec3c9}
\field{sortinit}{I}
\field{sortinithash}{8d291c51ee89b6cd86bf5379f0b151d8}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.intel.com/content/www/us/en/architecture-and-technology/intel-management-engine.html}}
\field{note}{Accessed: 2024-07-05}
\field{title}{Intel Management Engine (Intel ME)}
\true{nocite}
\endentry
\entry{offsec_bios_smm}{article}{}
\name{author}{2}{}{%
{{hash=5f0adf197576f745db5616612237177f}{%
family={Kallenberg},
familyi={K\bibinitperiod},
given={Corey},
giveni={C\bibinitperiod}}}%
{{hash=befb18be37cd351fd592753473a8806e}{%
family={Kovah},
familyi={K\bibinitperiod},
given={Xeno},
giveni={X\bibinitperiod}}}%
}
\strng{namehash}{70fa1c8368a19b98e1600548ec87ea1f}
\strng{fullhash}{70fa1c8368a19b98e1600548ec87ea1f}
\strng{bibnamehash}{70fa1c8368a19b98e1600548ec87ea1f}
\strng{authorbibnamehash}{70fa1c8368a19b98e1600548ec87ea1f}
\strng{authornamehash}{70fa1c8368a19b98e1600548ec87ea1f}
\strng{authorfullhash}{70fa1c8368a19b98e1600548ec87ea1f}
\field{sortinit}{K}
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{BIOS and SMM Internals}
\field{year}{2014}
\verb{urlraw}
\verb https://opensecuritytraining.info/IntroBIOS_files/Day1_07_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMM.pdf
\endverb
\verb{url}
\verb https://opensecuritytraining.info/IntroBIOS_files/Day1_07_Advanced%20x86%20-%20BIOS%20and%20SMM%20Internals%20-%20SMM.pdf
\endverb
\endentry
\entry{amd_psp_overview}{inproceedings}{}
\name{author}{3}{}{%
{{hash=9aa60a0635fc104c28dda319ab8cca3d}{%
family={Kaplan},
familyi={K\bibinitperiod},
given={David},
giveni={D\bibinitperiod}}}%
{{hash=50223c62dee7675ba8f24e625d026c27}{%
family={Powell},
familyi={P\bibinitperiod},
given={Jeremy},
giveni={J\bibinitperiod}}}%
{{hash=f05ca959cba94cb91d78975fcbee4787}{%
family={Woller},
familyi={W\bibinitperiod},
given={Tom},
giveni={T\bibinitperiod}}}%
}
\strng{namehash}{b5e851ee8429e8e91668d1d3551901cd}
\strng{fullhash}{b5e851ee8429e8e91668d1d3551901cd}
\strng{bibnamehash}{b5e851ee8429e8e91668d1d3551901cd}
\strng{authorbibnamehash}{b5e851ee8429e8e91668d1d3551901cd}
\strng{authornamehash}{b5e851ee8429e8e91668d1d3551901cd}
\strng{authorfullhash}{b5e851ee8429e8e91668d1d3551901cd}
\field{sortinit}{K}
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Architectural Support for Programming Languages and Operating Systems}
\field{title}{AMD Memory Encryption}
\field{year}{2016}
\field{pages}{149\bibrangedash 160}
\range{pages}{12}
\verb{doi}
\verb 10.1145/2851141.2851148
\endverb
\endentry
\entry{uefi_smm_security}{book}{}
\name{author}{3}{}{%
{{hash=0f5d712d2df5a2eb138c92b8957c02fe}{%
family={Krebs},
familyi={K\bibinitperiod},
given={Ronald\bibnamedelima D.},
giveni={R\bibinitperiod\bibinitdelim D\bibinitperiod}}}%
{{hash=607b9f5f93f583fb8a4a28cc4a5937ae}{%
family={Zimmer},
familyi={Z\bibinitperiod},
given={Vincent},
giveni={V\bibinitperiod}}}%
{{hash=15304da870cc73994d161d9c4681f167}{%
family={Marisetty},
familyi={M\bibinitperiod},
given={Suresh},
giveni={S\bibinitperiod}}}%
}
\list{publisher}{1}{%
{Intel Press}%
}
\strng{namehash}{e3efa1b46cc11cf21c59b308c4a3951d}
\strng{fullhash}{e3efa1b46cc11cf21c59b308c4a3951d}
\strng{bibnamehash}{e3efa1b46cc11cf21c59b308c4a3951d}
\strng{authorbibnamehash}{e3efa1b46cc11cf21c59b308c4a3951d}
\strng{authornamehash}{e3efa1b46cc11cf21c59b308c4a3951d}
\strng{authorfullhash}{e3efa1b46cc11cf21c59b308c4a3951d}
\field{sortinit}{K}
\field{sortinithash}{c02bf6bff1c488450c352b40f5d853ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{edition}{3rd}
\field{isbn}{978-0974364906}
\field{title}{Beyond BIOS: Developing with the Unified Extensible Firmware Interface}
\field{year}{2017}
\endentry
\entry{numa}{article}{}
\name{author}{1}{}{%
{{hash=419af6f87214eb9f2bfa2a03a877cb04}{%
family={Lameter},
familyi={L\bibinitperiod},
given={Christoph},
giveni={C\bibinitperiod}}}%
}
\strng{namehash}{419af6f87214eb9f2bfa2a03a877cb04}
\strng{fullhash}{419af6f87214eb9f2bfa2a03a877cb04}
\strng{bibnamehash}{419af6f87214eb9f2bfa2a03a877cb04}
\strng{authorbibnamehash}{419af6f87214eb9f2bfa2a03a877cb04}
\strng{authornamehash}{419af6f87214eb9f2bfa2a03a877cb04}
\strng{authorfullhash}{419af6f87214eb9f2bfa2a03a877cb04}
\field{sortinit}{L}
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Queue}
\field{month}{07}
\field{title}{NUMA (Non-Uniform Memory Access): An Overview}
\field{volume}{11}
\field{year}{2013}
\true{nocite}
\verb{doi}
\verb 10.1145/2508834.2513149
\endverb
\endentry
\entry{cyber_smm_hack}{report}{}
\name{author}{4}{}{%
{{hash=e0fdb42b953ef541418307b69787da0c}{%
family={Levillain},
familyi={L\bibinitperiod},
given={Olivier},
giveni={O\bibinitperiod}}}%
{{hash=905dd1958bf443fbba3af917505aca40}{%
family={Francillon},
familyi={F\bibinitperiod},
given={Aurelien},
giveni={A\bibinitperiod}}}%
{{hash=6adb386609edde844be6de64fdefae58}{%
family={Fratantonio},
familyi={F\bibinitperiod},
given={Yanick},
giveni={Y\bibinitperiod}}}%
{{hash=14cb44e160bd085923d2216f78867ae2}{%
family={Balzarotti},
familyi={B\bibinitperiod},
given={Davide},
giveni={D\bibinitperiod}}}%
}
\list{institution}{1}{%
{ANSSI, Eurecom}%
}
\strng{namehash}{153c7a919bb6611940c22d22f6bc457e}
\strng{fullhash}{08e99c283b578e98b81e72ebd0e9b364}
\strng{bibnamehash}{153c7a919bb6611940c22d22f6bc457e}
\strng{authorbibnamehash}{153c7a919bb6611940c22d22f6bc457e}
\strng{authornamehash}{153c7a919bb6611940c22d22f6bc457e}
\strng{authorfullhash}{08e99c283b578e98b81e72ebd0e9b364}
\field{sortinit}{L}
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{How to Protect the BIOS and its Secrets}
\field{type}{techreport}
\field{year}{2011}
\verb{urlraw}
\verb https://cyber.gouv.fr/sites/default/files/IMG/pdf/Cansec_final.pdf
\endverb
\verb{url}
\verb https://cyber.gouv.fr/sites/default/files/IMG/pdf/Cansec_final.pdf
\endverb
\endentry
\entry{LiHuiyong2014RRoD}{article}{}
\name{author}{4}{}{%
{{hash=5372cdbd3052ccafb8205b01ca06d602}{%
family={Li},
familyi={L\bibinitperiod},
given={Huiyong},
giveni={H\bibinitperiod}}}%
{{hash=14f153fc939f9cdd32dcf4e81e3246d5}{%
family={Jiang},
familyi={J\bibinitperiod},
given={Hongxu},
giveni={H\bibinitperiod}}}%
{{hash=a9c8728e355996d027a7e56b60820a18}{%
family={Li},
familyi={L\bibinitperiod},
given={Bo},
giveni={B\bibinitperiod}}}%
{{hash=a4bbc4ff61eed77cccdacec89a39b2c6}{%
family={Duan},
familyi={D\bibinitperiod},
given={Miyi},
giveni={M\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{location}{1}{%
{United States}%
}
\list{publisher}{1}{%
{Hindawi Publishing Corporation}%
}
\strng{namehash}{2dbb6be882893005ad907124afa1f218}
\strng{fullhash}{e9ffcb79d98e9c0c1203b8f7d307dab3}
\strng{bibnamehash}{2dbb6be882893005ad907124afa1f218}
\strng{authorbibnamehash}{2dbb6be882893005ad907124afa1f218}
\strng{authornamehash}{2dbb6be882893005ad907124afa1f218}
\strng{authorfullhash}{e9ffcb79d98e9c0c1203b8f7d307dab3}
\field{sortinit}{L}
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{2356-6140}
\field{journaltitle}{TheScientificWorld}
\field{title}{Reflection Reduction on DDR3 High-Speed Bus by Improved PSO}
\field{volume}{2014}
\field{year}{2014}
\true{nocite}
\field{pages}{257972\bibrangedash 11}
\range{pages}{-60}
\keyw{Algorithms ; Buses ; Efficiency ; Experiments ; Mathematical models ; Mathematical optimization ; Motor vehicles ; Properties ; Reading ; Signals and signaling}
\endentry
\entry{samsung_ddr3}{manual}{}
\name{author}{1}{}{%
{{hash=18ee2446b26d5ac68be7ad188faa3f28}{%
family={Ltd},
familyi={L\bibinitperiod},
given={Samsung\bibnamedelimb Electronics\bibnamedelima Co.},
giveni={S\bibinitperiod\bibinitdelim E\bibinitperiod\bibinitdelim C\bibinitperiod}}}%
}
\strng{namehash}{18ee2446b26d5ac68be7ad188faa3f28}
\strng{fullhash}{18ee2446b26d5ac68be7ad188faa3f28}
\strng{bibnamehash}{18ee2446b26d5ac68be7ad188faa3f28}
\strng{authorbibnamehash}{18ee2446b26d5ac68be7ad188faa3f28}
\strng{authornamehash}{18ee2446b26d5ac68be7ad188faa3f28}
\strng{authorfullhash}{18ee2446b26d5ac68be7ad188faa3f28}
\field{sortinit}{L}
\field{sortinithash}{7c47d417cecb1f4bd38d1825c427a61a}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{month}{11}
\field{number}{TN-41-02}
\field{title}{DDR3 SDRAM Specification Rev 1.4}
\field{year}{2011}
\true{nocite}
\endentry
\entry{blobs}{misc}{}
\name{author}{1}{}{%
{{hash=368573a2727cae4111de5ad066039578}{%
family={maintainers},
familyi={m\bibinitperiod},
given={GNU\bibnamedelima Boot},
giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod},
prefix={project},
prefixi={p\bibinitperiod}}}%
}
\strng{namehash}{368573a2727cae4111de5ad066039578}
\strng{fullhash}{368573a2727cae4111de5ad066039578}
\strng{bibnamehash}{368573a2727cae4111de5ad066039578}
\strng{authorbibnamehash}{368573a2727cae4111de5ad066039578}
\strng{authornamehash}{368573a2727cae4111de5ad066039578}
\strng{authorfullhash}{368573a2727cae4111de5ad066039578}
\field{extraname}{1}
\field{sortinit}{m}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.gnu.org/software/gnuboot/web/faq.html}}
\field{note}{Accessed: 2024-07-23}
\field{title}{Frequently Asked Questions}
\endentry
\entry{gnuboot}{misc}{}
\name{author}{1}{}{%
{{hash=368573a2727cae4111de5ad066039578}{%
family={maintainers},
familyi={m\bibinitperiod},
given={GNU\bibnamedelima Boot},
giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod},
prefix={project},
prefixi={p\bibinitperiod}}}%
}
\strng{namehash}{368573a2727cae4111de5ad066039578}
\strng{fullhash}{368573a2727cae4111de5ad066039578}
\strng{bibnamehash}{368573a2727cae4111de5ad066039578}
\strng{authorbibnamehash}{368573a2727cae4111de5ad066039578}
\strng{authornamehash}{368573a2727cae4111de5ad066039578}
\strng{authorfullhash}{368573a2727cae4111de5ad066039578}
\field{extraname}{2}
\field{sortinit}{m}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{GNU Boot --- Free your BIOS today!}
\field{year}{2024}
\verb{urlraw}
\verb https://www.gnu.org/software/gnuboot/
\endverb
\verb{url}
\verb https://www.gnu.org/software/gnuboot/
\endverb
\endentry
\entry{gnuboot_status}{misc}{}
\name{author}{1}{}{%
{{hash=368573a2727cae4111de5ad066039578}{%
family={maintainers},
familyi={m\bibinitperiod},
given={GNU\bibnamedelima Boot},
giveni={G\bibinitperiod\bibinitdelim B\bibinitperiod},
prefix={project},
prefixi={p\bibinitperiod}}}%
}
\strng{namehash}{368573a2727cae4111de5ad066039578}
\strng{fullhash}{368573a2727cae4111de5ad066039578}
\strng{bibnamehash}{368573a2727cae4111de5ad066039578}
\strng{authorbibnamehash}{368573a2727cae4111de5ad066039578}
\strng{authornamehash}{368573a2727cae4111de5ad066039578}
\strng{authorfullhash}{368573a2727cae4111de5ad066039578}
\field{extraname}{3}
\field{sortinit}{m}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{GNU Boot --- Status}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://www.gnu.org/software/gnuboot/web/status.html
\endverb
\verb{url}
\verb https://www.gnu.org/software/gnuboot/web/status.html
\endverb
\endentry
\entry{coreboot_challenges}{article}{}
\name{author}{2}{}{%
{{hash=af33676c3a4888dfa26a657f486708df}{%
family={Minnich},
familyi={M\bibinitperiod},
given={R.},
giveni={R\bibinitperiod}}}%
{{hash=4f177e6be4bf4c60155596239dcc4b34}{%
family={Hendricks},
familyi={H\bibinitperiod},
given={E.},
giveni={E\bibinitperiod}}}%
}
\strng{namehash}{4903c46d98ac613dcc8fd38bbe396ae4}
\strng{fullhash}{4903c46d98ac613dcc8fd38bbe396ae4}
\strng{bibnamehash}{4903c46d98ac613dcc8fd38bbe396ae4}
\strng{authorbibnamehash}{4903c46d98ac613dcc8fd38bbe396ae4}
\strng{authornamehash}{4903c46d98ac613dcc8fd38bbe396ae4}
\strng{authorfullhash}{4903c46d98ac613dcc8fd38bbe396ae4}
\field{sortinit}{M}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Journal of Open Source Software}
\field{number}{29}
\field{title}{Challenges and Progress in coreboot Development}
\field{volume}{3}
\field{year}{2018}
\field{pages}{1\bibrangedash 6}
\range{pages}{6}
\verb{doi}
\verb 10.21105/joss.00429
\endverb
\endentry
\entry{minnich_status}{inproceedings}{}
\name{author}{1}{}{%
{{hash=996532a0f0ccb5fbf90b3fc854eb3fad}{%
family={Minnich},
familyi={M\bibinitperiod},
given={Ron},
giveni={R\bibinitperiod}}}%
}
\strng{namehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
\strng{fullhash}{996532a0f0ccb5fbf90b3fc854eb3fad}
\strng{bibnamehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
\strng{authorbibnamehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
\strng{authornamehash}{996532a0f0ccb5fbf90b3fc854eb3fad}
\strng{authorfullhash}{996532a0f0ccb5fbf90b3fc854eb3fad}
\field{sortinit}{M}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{coreboot: Status and some history}
\field{year}{2006}
\true{nocite}
\endentry
\entry{minnich_coreboot}{article}{}
\name{author}{3}{}{%
{{hash=996532a0f0ccb5fbf90b3fc854eb3fad}{%
family={Minnich},
familyi={M\bibinitperiod},
given={Ron},
giveni={R\bibinitperiod}}}%
{{hash=338aa5983567160bd6e7d5d77184578a}{%
family={Reinauer},
familyi={R\bibinitperiod},
given={Stefan},
giveni={S\bibinitperiod}}}%
{{hash=f51f40aa097a46fae7ce40dcd09839f8}{%
family={Georgi},
familyi={G\bibinitperiod},
given={Patrick},
giveni={P\bibinitperiod}}}%
}
\strng{namehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
\strng{fullhash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
\strng{bibnamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
\strng{authorbibnamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
\strng{authornamehash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
\strng{authorfullhash}{1d5b6a035ece056f3d14b3fb9dd1e2a8}
\field{sortinit}{M}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Google Research}
\field{title}{coreboot: Open-Source Firmware Platform}
\field{year}{2017}
\true{nocite}
\verb{urlraw}
\verb https://research.google/pubs/pub45424/
\endverb
\verb{url}
\verb https://research.google/pubs/pub45424/
\endverb
\endentry
\entry{mohr2012comparative}{report}{}
\name{author}{1}{}{%
{{hash=8e03e86ade8b47700c0dbfe66ab4829c}{%
family={Mohr},
familyi={M\bibinitperiod},
given={Benjamin},
giveni={B\bibinitperiod}}}%
}
\list{institution}{1}{%
{University of Freiburg}%
}
\strng{namehash}{8e03e86ade8b47700c0dbfe66ab4829c}
\strng{fullhash}{8e03e86ade8b47700c0dbfe66ab4829c}
\strng{bibnamehash}{8e03e86ade8b47700c0dbfe66ab4829c}
\strng{authorbibnamehash}{8e03e86ade8b47700c0dbfe66ab4829c}
\strng{authornamehash}{8e03e86ade8b47700c0dbfe66ab4829c}
\strng{authorfullhash}{8e03e86ade8b47700c0dbfe66ab4829c}
\field{sortinit}{M}
\field{sortinithash}{4625c616857f13d17ce56f7d4f97d451}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{A Comparative Analysis of Bootloaders}
\field{type}{techreport}
\field{year}{2012}
\endentry
\entry{nuvoton}{manual}{}
\name{author}{1}{}{%
{{hash=3c26c5dfa62a2ce99c0fffbdbd5f69f3}{%
family={{Nuvoton Technology Corporation}},
familyi={N\bibinitperiod}}}%
}
\strng{namehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
\strng{fullhash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
\strng{bibnamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
\strng{authorbibnamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
\strng{authornamehash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
\strng{authorfullhash}{3c26c5dfa62a2ce99c0fffbdbd5f69f3}
\field{sortinit}{N}
\field{sortinithash}{22369a73d5f88983a108b63f07f37084}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-17}
\field{title}{Nuvoton W83795G/ADG Hardware Monitor Datasheet}
\verb{urlraw}
\verb https://www.nuvoton.com/
\endverb
\verb{url}
\verb https://www.nuvoton.com/
\endverb
\endentry
\entry{AlexanderOgolyuk2017UBaI}{article}{}
\name{author}{3}{}{%
{{hash=e471e22ecc8ac7b4a9a0aeef1178d250}{%
family={Ogolyuk},
familyi={O\bibinitperiod},
given={Alexander},
giveni={A\bibinitperiod}}}%
{{hash=6170c563f791330913063ddfb3794ab2}{%
family={Sheglov},
familyi={S\bibinitperiod},
given={Andrey},
giveni={A\bibinitperiod}}}%
{{hash=6ae0d6e6b1e57e62fd27bd8899d2b131}{%
family={Sheglov},
familyi={S\bibinitperiod},
given={Konstantin},
giveni={K\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{publisher}{1}{%
{FRUCT}%
}
\strng{namehash}{905455d8b9db1e1077b6dddccca21810}
\strng{fullhash}{905455d8b9db1e1077b6dddccca21810}
\strng{bibnamehash}{905455d8b9db1e1077b6dddccca21810}
\strng{authorbibnamehash}{905455d8b9db1e1077b6dddccca21810}
\strng{authornamehash}{905455d8b9db1e1077b6dddccca21810}
\strng{authorfullhash}{905455d8b9db1e1077b6dddccca21810}
\field{sortinit}{O}
\field{sortinithash}{2cd7140a07aea5341f9e2771efe90aae}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{2305-7254}
\field{journaltitle}{Proceedings of the XXth Conference of Open Innovations Association FRUCT}
\field{number}{20}
\field{title}{UEFI BIOS and Intel Management Engine Attack Vectors and Vulnerabilities}
\field{volume}{776}
\field{year}{2017}
\true{nocite}
\field{pages}{657\bibrangedash 662}
\range{pages}{6}
\endentry
\entry{pearson2014}{inproceedings}{}
\name{author}{1}{}{%
{{hash=0cb7f02abd4eddb75a923fdbd4722b97}{%
family={Pearson},
familyi={P\bibinitperiod},
given={Timothy},
giveni={T\bibinitperiod}}}%
}
\strng{namehash}{0cb7f02abd4eddb75a923fdbd4722b97}
\strng{fullhash}{0cb7f02abd4eddb75a923fdbd4722b97}
\strng{bibnamehash}{0cb7f02abd4eddb75a923fdbd4722b97}
\strng{authorbibnamehash}{0cb7f02abd4eddb75a923fdbd4722b97}
\strng{authornamehash}{0cb7f02abd4eddb75a923fdbd4722b97}
\strng{authorfullhash}{0cb7f02abd4eddb75a923fdbd4722b97}
\field{sortinit}{P}
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{The World Beyond x86}
\field{year}{2014}
\true{nocite}
\endentry
\entry{acpi_programming}{manual}{}
\name{author}{1}{}{%
{{hash=30947d4473970fd63cd5dcb7c90a8e4a}{%
family={Project},
familyi={P\bibinitperiod},
given={ACPICA},
giveni={A\bibinitperiod}}}%
}
\strng{namehash}{30947d4473970fd63cd5dcb7c90a8e4a}
\strng{fullhash}{30947d4473970fd63cd5dcb7c90a8e4a}
\strng{bibnamehash}{30947d4473970fd63cd5dcb7c90a8e4a}
\strng{authorbibnamehash}{30947d4473970fd63cd5dcb7c90a8e4a}
\strng{authornamehash}{30947d4473970fd63cd5dcb7c90a8e4a}
\strng{authorfullhash}{30947d4473970fd63cd5dcb7c90a8e4a}
\field{sortinit}{P}
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-03}
\field{title}{ACPI Component Architecture Programmer Reference}
\field{year}{2017}
\verb{urlraw}
\verb https://acpica.org/documentation
\endverb
\verb{url}
\verb https://acpica.org/documentation
\endverb
\endentry
\entry{coreboot_docs}{manual}{}
\name{author}{1}{}{%
{{hash=ef0efcc19e2d35e9a880cf0cc2e05d7a}{%
family={Project},
familyi={P\bibinitperiod},
prefix={coreboot},
prefixi={c\bibinitperiod}}}%
}
\strng{namehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
\strng{fullhash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
\strng{bibnamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
\strng{authorbibnamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
\strng{authornamehash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
\strng{authorfullhash}{ef0efcc19e2d35e9a880cf0cc2e05d7a}
\field{sortinit}{P}
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{coreboot Documentation}
\field{year}{2023}
\verb{urlraw}
\verb https://doc.coreboot.org/
\endverb
\verb{url}
\verb https://doc.coreboot.org/
\endverb
\endentry
\entry{coreboot_payloads}{misc}{}
\name{author}{1}{}{%
{{hash=22efab6c3f492e2d3e5ff09a274d19e3}{%
family={project},
familyi={p\bibinitperiod},
prefix={coreboot},
prefixi={c\bibinitperiod}}}%
}
\strng{namehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{fullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{bibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{authorbibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{authornamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{authorfullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
\field{extraname}{1}
\field{sortinit}{p}
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.coreboot.org/Payloads}}
\field{note}{Accessed: 2024-07-23}
\field{title}{coreboot Payloads}
\endentry
\entry{coreboot}{misc}{}
\name{author}{1}{}{%
{{hash=22efab6c3f492e2d3e5ff09a274d19e3}{%
family={project},
familyi={p\bibinitperiod},
prefix={coreboot},
prefixi={c\bibinitperiod}}}%
}
\strng{namehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{fullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{bibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{authorbibnamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{authornamehash}{22efab6c3f492e2d3e5ff09a274d19e3}
\strng{authorfullhash}{22efab6c3f492e2d3e5ff09a274d19e3}
\field{extraname}{2}
\field{sortinit}{p}
\field{sortinithash}{ff3bcf24f47321b42cb156c2cc8a8422}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://www.coreboot.org/}}
\field{note}{Accessed: 2024-07-23}
\field{title}{coreboot: Open Source Firmware}
\endentry
\entry{raptor_engineering}{misc}{}
\name{author}{1}{}{%
{{hash=569ce67269d64596584ac37190233093}{%
family={{Raptor Engineering LLC}},
familyi={R\bibinitperiod}}}%
}
\strng{namehash}{569ce67269d64596584ac37190233093}
\strng{fullhash}{569ce67269d64596584ac37190233093}
\strng{bibnamehash}{569ce67269d64596584ac37190233093}
\strng{authorbibnamehash}{569ce67269d64596584ac37190233093}
\strng{authornamehash}{569ce67269d64596584ac37190233093}
\strng{authorfullhash}{569ce67269d64596584ac37190233093}
\field{sortinit}{R}
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 8-May-2024]}
\field{title}{Raptor Engineering website}
\field{year}{2009-2024}
\true{nocite}
\verb{urlraw}
\verb https://raptorengineering.com/
\endverb
\verb{url}
\verb https://raptorengineering.com/
\endverb
\endentry
\entry{reinauer2008coreboot}{inproceedings}{}
\true{moreauthor}
\true{morelabelname}
\name{author}{1}{}{%
{{hash=338aa5983567160bd6e7d5d77184578a}{%
family={Reinauer},
familyi={R\bibinitperiod},
given={Stefan},
giveni={S\bibinitperiod}}}%
}
\strng{namehash}{87fc69411b96945ba4e4bc38d0a0f41b}
\strng{fullhash}{87fc69411b96945ba4e4bc38d0a0f41b}
\strng{bibnamehash}{87fc69411b96945ba4e4bc38d0a0f41b}
\strng{authorbibnamehash}{87fc69411b96945ba4e4bc38d0a0f41b}
\strng{authornamehash}{87fc69411b96945ba4e4bc38d0a0f41b}
\strng{authorfullhash}{87fc69411b96945ba4e4bc38d0a0f41b}
\field{sortinit}{R}
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Usenix Annual Technical Conference}
\field{title}{The coreboot Open Source BIOS - A Review}
\field{year}{2008}
\endentry
\entry{richter2011bios}{inproceedings}{}
\name{author}{4}{}{%
{{hash=abb58308e6ee7df811f38441e9735701}{%
family={Richter},
familyi={R\bibinitperiod},
given={Felix},
giveni={F\bibinitperiod}}}%
{{hash=9df7b64d77a60e8340331f1ead58166c}{%
family={Wressnegger},
familyi={W\bibinitperiod},
given={Christian},
giveni={C\bibinitperiod}}}%
{{hash=409de46de24e2dbda2e942c5d80cb043}{%
family={Schwenk},
familyi={S\bibinitperiod},
given={Thorsten},
giveni={T\bibinitperiod}}}%
{{hash=ea36f719c6140abf47846202eb4673e0}{%
family={Muller},
familyi={M\bibinitperiod},
given={Thorsten},
giveni={T\bibinitperiod}}}%
}
\strng{namehash}{8ca4cd3956658a3fde469908f7056e2d}
\strng{fullhash}{5335382c4add8a538f3e649961f8d099}
\strng{bibnamehash}{8ca4cd3956658a3fde469908f7056e2d}
\strng{authorbibnamehash}{8ca4cd3956658a3fde469908f7056e2d}
\strng{authornamehash}{8ca4cd3956658a3fde469908f7056e2d}
\strng{authorfullhash}{5335382c4add8a538f3e649961f8d099}
\field{sortinit}{R}
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security}
\field{title}{BIOS and UEFI firmware analysis}
\field{year}{2011}
\true{nocite}
\field{pages}{7\bibrangedash 16}
\range{pages}{10}
\endentry
\entry{rosenberg1994open}{book}{}
\name{author}{1}{}{%
{{hash=3fecee81a14fc53c8d7a0eb4baa7c3a4}{%
family={Rosenberg},
familyi={R\bibinitperiod},
given={Ronald\bibnamedelima H},
giveni={R\bibinitperiod\bibinitdelim H\bibinitperiod}}}%
}
\list{publisher}{1}{%
{IEEE Computer Society Press}%
}
\strng{namehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
\strng{fullhash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
\strng{bibnamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
\strng{authorbibnamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
\strng{authornamehash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
\strng{authorfullhash}{3fecee81a14fc53c8d7a0eb4baa7c3a4}
\field{sortinit}{R}
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Open architecture computer systems}
\field{year}{1994}
\true{nocite}
\endentry
\entry{rudolph2007}{inproceedings}{}
\name{author}{1}{}{%
{{hash=9f897e096e6193a84feb0a5b0ca95d1e}{%
family={Rudolph},
familyi={R\bibinitperiod},
given={M.},
giveni={M\bibinitperiod}}}%
}
\strng{namehash}{9f897e096e6193a84feb0a5b0ca95d1e}
\strng{fullhash}{9f897e096e6193a84feb0a5b0ca95d1e}
\strng{bibnamehash}{9f897e096e6193a84feb0a5b0ca95d1e}
\strng{authorbibnamehash}{9f897e096e6193a84feb0a5b0ca95d1e}
\strng{authornamehash}{9f897e096e6193a84feb0a5b0ca95d1e}
\strng{authorfullhash}{9f897e096e6193a84feb0a5b0ca95d1e}
\field{sortinit}{R}
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{booktitle}{Proceedings of the Linux Symposium}
\field{title}{LinuxBIOS: Open Source Boot Firmware}
\field{year}{2007}
\field{pages}{159\bibrangedash 167}
\range{pages}{9}
\verb{urlraw}
\verb https://ols.fedoraproject.org/OLS/Reprints-2007/rudolph-Reprint.pdf
\endverb
\verb{url}
\verb https://ols.fedoraproject.org/OLS/Reprints-2007/rudolph-Reprint.pdf
\endverb
\endentry
\entry{russinovich2012}{book}{}
\name{author}{3}{}{%
{{hash=4c2da4e3b650f0a6bffc044b397680cc}{%
family={Russinovich},
familyi={R\bibinitperiod},
given={M.\bibnamedelimi E.},
giveni={M\bibinitperiod\bibinitdelim E\bibinitperiod}}}%
{{hash=749b374b1372bc938a228f56eced2d1a}{%
family={Solomon},
familyi={S\bibinitperiod},
given={D.\bibnamedelimi A.},
giveni={D\bibinitperiod\bibinitdelim A\bibinitperiod}}}%
{{hash=131b67d6604bc9d457955edcc178a127}{%
family={Ionescu},
familyi={I\bibinitperiod},
given={A.},
giveni={A\bibinitperiod}}}%
}
\list{publisher}{1}{%
{Microsoft Press}%
}
\strng{namehash}{cec07f798ad226261c1a84a121a934c0}
\strng{fullhash}{cec07f798ad226261c1a84a121a934c0}
\strng{bibnamehash}{cec07f798ad226261c1a84a121a934c0}
\strng{authorbibnamehash}{cec07f798ad226261c1a84a121a934c0}
\strng{authornamehash}{cec07f798ad226261c1a84a121a934c0}
\strng{authorfullhash}{cec07f798ad226261c1a84a121a934c0}
\field{sortinit}{R}
\field{sortinithash}{5e1c39a9d46ffb6bebd8f801023a9486}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{edition}{6th}
\field{title}{Windows Internals, Part 1}
\field{year}{2012}
\endentry
\entry{anandtech_bulldozer}{article}{}
\name{author}{1}{}{%
{{hash=a2fcb5fbf9cbaac444753f21ef5733c6}{%
family={Shimpi},
familyi={S\bibinitperiod},
given={Anand\bibnamedelima Lal},
giveni={A\bibinitperiod\bibinitdelim L\bibinitperiod}}}%
}
\strng{namehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
\strng{fullhash}{a2fcb5fbf9cbaac444753f21ef5733c6}
\strng{bibnamehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
\strng{authorbibnamehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
\strng{authornamehash}{a2fcb5fbf9cbaac444753f21ef5733c6}
\strng{authorfullhash}{a2fcb5fbf9cbaac444753f21ef5733c6}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{AnandTech}
\field{title}{The Bulldozer Review: AMD FX-8150 Tested}
\field{year}{2011}
\verb{urlraw}
\verb https://www.anandtech.com/show/4955/the-bulldozer-review-amd-fx8150-tested
\endverb
\verb{url}
\verb https://www.anandtech.com/show/4955/the-bulldozer-review-amd-fx8150-tested
\endverb
\endentry
\entry{shin2011}{article}{}
\name{author}{2}{}{%
{{hash=8e68dee2d88f90cfacabb9608669b060}{%
family={Shin},
familyi={S\bibinitperiod},
given={M.},
giveni={M\bibinitperiod}}}%
{{hash=e57d0b1f72e19c844023fb5ae360f752}{%
family={Lee},
familyi={L\bibinitperiod},
given={K.},
giveni={K\bibinitperiod}}}%
}
\strng{namehash}{c3f174f40fa786c163c984606bf2335a}
\strng{fullhash}{c3f174f40fa786c163c984606bf2335a}
\strng{bibnamehash}{c3f174f40fa786c163c984606bf2335a}
\strng{authorbibnamehash}{c3f174f40fa786c163c984606bf2335a}
\strng{authornamehash}{c3f174f40fa786c163c984606bf2335a}
\strng{authorfullhash}{c3f174f40fa786c163c984606bf2335a}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{Journal of Computer Science and Technology}
\field{number}{2}
\field{title}{Design and Implementation of a UEFI-Compliant Firmware Platform}
\field{volume}{26}
\field{year}{2011}
\field{pages}{219\bibrangedash 230}
\range{pages}{12}
\verb{doi}
\verb 10.1007/s11390-011-0121-8
\endverb
\endentry
\entry{shustek2016kildall}{misc}{}
\name{author}{1}{}{%
{{hash=c26de56d0912649a64854ccba2dbc8e1}{%
family={Shustek},
familyi={S\bibinitperiod},
given={Leonard\bibnamedelima J.},
giveni={L\bibinitperiod\bibinitdelim J\bibinitperiod}}}%
}
\strng{namehash}{c26de56d0912649a64854ccba2dbc8e1}
\strng{fullhash}{c26de56d0912649a64854ccba2dbc8e1}
\strng{bibnamehash}{c26de56d0912649a64854ccba2dbc8e1}
\strng{authorbibnamehash}{c26de56d0912649a64854ccba2dbc8e1}
\strng{authornamehash}{c26de56d0912649a64854ccba2dbc8e1}
\strng{authorfullhash}{c26de56d0912649a64854ccba2dbc8e1}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{Computer History Museum Blog}
\field{note}{Accessed: August 16, 2024}
\field{title}{In His Own Words: Gary Kildall}
\field{year}{2016}
\verb{urlraw}
\verb https://computerhistory.org/blog/in-his-own-words-gary-kildall/
\endverb
\verb{url}
\verb https://computerhistory.org/blog/in-his-own-words-gary-kildall/
\endverb
\endentry
\entry{SridharanVilas2015MEiM}{article}{}
\name{author}{7}{}{%
{{hash=424e5d7c7305b93eade0897c378a833a}{%
family={Sridharan},
familyi={S\bibinitperiod},
given={Vilas},
giveni={V\bibinitperiod}}}%
{{hash=7dcd293f0266c03f1b274f6e49a7fd99}{%
family={DeBardeleben},
familyi={D\bibinitperiod},
given={Nathan},
giveni={N\bibinitperiod}}}%
{{hash=709868da6f9c5c23f722f4b7c0a473f4}{%
family={Blanchard},
familyi={B\bibinitperiod},
given={Sean},
giveni={S\bibinitperiod}}}%
{{hash=cbc6e783519df8ff0de6b6631442319a}{%
family={Ferreira},
familyi={F\bibinitperiod},
given={Kurt\bibnamedelima B.},
giveni={K\bibinitperiod\bibinitdelim B\bibinitperiod}}}%
{{hash=18ca07e0da61f3be699c8003f4ee93b4}{%
family={Stearley},
familyi={S\bibinitperiod},
given={Jon},
giveni={J\bibinitperiod}}}%
{{hash=8411e32c5282692ec8fb33ae8efc7b3a}{%
family={Shalf},
familyi={S\bibinitperiod},
given={John},
giveni={J\bibinitperiod}}}%
{{hash=370b98113e6d3786aca18de5ef4a72ff}{%
family={Gurumurthi},
familyi={G\bibinitperiod},
given={Sudhanva},
giveni={S\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\strng{namehash}{aeb9446378538df625b4820c6fa03b69}
\strng{fullhash}{175a0847e434ba3d53ed4787fd09be05}
\strng{bibnamehash}{aeb9446378538df625b4820c6fa03b69}
\strng{authorbibnamehash}{aeb9446378538df625b4820c6fa03b69}
\strng{authornamehash}{aeb9446378538df625b4820c6fa03b69}
\strng{authorfullhash}{175a0847e434ba3d53ed4787fd09be05}
\field{sortinit}{S}
\field{sortinithash}{b164b07b29984b41daf1e85279fbc5ab}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{0163-5964}
\field{journaltitle}{Computer architecture news}
\field{number}{1}
\field{title}{Memory Errors in Modern Systems: The Good, The Bad, and The Ugly}
\field{volume}{43}
\field{year}{2015}
\true{nocite}
\field{pages}{297\bibrangedash 310}
\range{pages}{14}
\endentry
\entry{lip6_annuaire}{misc}{}
\name{author}{1}{}{%
{{hash=a220fc1da6562fa2e1e0bc05c201b485}{%
family={Université/CNRS},
familyi={U\bibinitperiod},
given={Sorbonne},
giveni={S\bibinitperiod}}}%
}
\strng{namehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{fullhash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{bibnamehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{authorbibnamehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{authornamehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{authorfullhash}{a220fc1da6562fa2e1e0bc05c201b485}
\field{extraname}{1}
\field{sortinit}{U}
\field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{Annuaire LIP6}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://www.lip6.fr/recherche/resultat.php?keyword=&find=Rechercher+au+LIP6
\endverb
\verb{url}
\verb https://www.lip6.fr/recherche/resultat.php?keyword=&find=Rechercher+au+LIP6
\endverb
\endentry
\entry{lip6_web}{misc}{}
\name{author}{1}{}{%
{{hash=a220fc1da6562fa2e1e0bc05c201b485}{%
family={Université/CNRS},
familyi={U\bibinitperiod},
given={Sorbonne},
giveni={S\bibinitperiod}}}%
}
\strng{namehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{fullhash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{bibnamehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{authorbibnamehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{authornamehash}{a220fc1da6562fa2e1e0bc05c201b485}
\strng{authorfullhash}{a220fc1da6562fa2e1e0bc05c201b485}
\field{extraname}{2}
\field{sortinit}{U}
\field{sortinithash}{6901a00e45705986ee5e7ca9fd39adca}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{Laboratoire d'Informatique de Paris 6}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://www.lip6.fr/
\endverb
\verb{url}
\verb https://www.lip6.fr/
\endverb
\endentry
\entry{coreboot_fsf}{inproceedings}{}
\name{author}{1}{}{%
{{hash=af41616b6f1e8e444fcc49b61089d90f}{%
family={Vandewege},
familyi={V\bibinitperiod},
given={Ward},
giveni={W\bibinitperiod}}}%
}
\strng{namehash}{af41616b6f1e8e444fcc49b61089d90f}
\strng{fullhash}{af41616b6f1e8e444fcc49b61089d90f}
\strng{bibnamehash}{af41616b6f1e8e444fcc49b61089d90f}
\strng{authorbibnamehash}{af41616b6f1e8e444fcc49b61089d90f}
\strng{authornamehash}{af41616b6f1e8e444fcc49b61089d90f}
\strng{authorfullhash}{af41616b6f1e8e444fcc49b61089d90f}
\field{sortinit}{V}
\field{sortinithash}{afb52128e5b4dc4b843768c0113d673b}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{title}{Coreboot: the view from the FSF}
\field{year}{2008}
\endentry
\entry{VersenM.2020Rhaa}{article}{}
\name{author}{2}{}{%
{{hash=c442b1f2c144f99fa527ef0ae0e89787}{%
family={Versen},
familyi={V\bibinitperiod},
given={M.},
giveni={M\bibinitperiod}}}%
{{hash=6571a9fefd8cd260223347a23bfaf144}{%
family={Ernst},
familyi={E\bibinitperiod},
given={W.},
giveni={W\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{publisher}{1}{%
{Elsevier Ltd}%
}
\strng{namehash}{190c742d46641dc9848cc3e17eb1b3ce}
\strng{fullhash}{190c742d46641dc9848cc3e17eb1b3ce}
\strng{bibnamehash}{190c742d46641dc9848cc3e17eb1b3ce}
\strng{authorbibnamehash}{190c742d46641dc9848cc3e17eb1b3ce}
\strng{authornamehash}{190c742d46641dc9848cc3e17eb1b3ce}
\strng{authorfullhash}{190c742d46641dc9848cc3e17eb1b3ce}
\field{sortinit}{V}
\field{sortinithash}{afb52128e5b4dc4b843768c0113d673b}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{0026-2714}
\field{journaltitle}{Microelectronics and reliability}
\field{title}{Row hammer avoidance analysis of DDR3 SDRAM}
\field{volume}{114}
\field{year}{2020}
\true{nocite}
\field{pages}{113744\bibrangedash}
\range{pages}{-1}
\endentry
\entry{vikings}{misc}{}
\name{author}{1}{}{%
{{hash=a151e054e930181c6173dc5edbf4d8e3}{%
family={{Vikings GmbH}},
familyi={V\bibinitperiod}}}%
}
\strng{namehash}{a151e054e930181c6173dc5edbf4d8e3}
\strng{fullhash}{a151e054e930181c6173dc5edbf4d8e3}
\strng{bibnamehash}{a151e054e930181c6173dc5edbf4d8e3}
\strng{authorbibnamehash}{a151e054e930181c6173dc5edbf4d8e3}
\strng{authornamehash}{a151e054e930181c6173dc5edbf4d8e3}
\strng{authorfullhash}{a151e054e930181c6173dc5edbf4d8e3}
\field{sortinit}{V}
\field{sortinithash}{afb52128e5b4dc4b843768c0113d673b}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-17}
\field{title}{Vikings Hardware Recommendations for KGPE-D16}
\verb{urlraw}
\verb https://wiki.vikings.net/KGPE-D16
\endverb
\verb{url}
\verb https://wiki.vikings.net/KGPE-D16
\endverb
\endentry
\entry{WangDong2019AIUb}{article}{}
\name{author}{2}{}{%
{{hash=4695c12fc5e5638d83abfb67ab9d459c}{%
family={Wang},
familyi={W\bibinitperiod},
given={Dong},
giveni={D\bibinitperiod}}}%
{{hash=1aac09ee1dcf318e0166bf96fdf3add8}{%
family={Dong},
familyi={D\bibinitperiod},
given={Wei\bibnamedelima Yu},
giveni={W\bibinitperiod\bibinitdelim Y\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{location}{1}{%
{Bristol}%
}
\list{publisher}{1}{%
{IOP Publishing}%
}
\strng{namehash}{f8e60a7e98273f88ed342577bd994ac5}
\strng{fullhash}{f8e60a7e98273f88ed342577bd994ac5}
\strng{bibnamehash}{f8e60a7e98273f88ed342577bd994ac5}
\strng{authorbibnamehash}{f8e60a7e98273f88ed342577bd994ac5}
\strng{authornamehash}{f8e60a7e98273f88ed342577bd994ac5}
\strng{authorfullhash}{f8e60a7e98273f88ed342577bd994ac5}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{1742-6588}
\field{journaltitle}{Journal of physics. Conference series}
\field{number}{4}
\field{title}{Attacking Intel UEFI by Using Cache Poisoning}
\field{volume}{1187}
\field{year}{2019}
\true{nocite}
\field{pages}{42072\bibrangedash}
\range{pages}{-1}
\keyw{Alliances ; Integrated circuits ; Poisoning}
\endentry
\entry{WaqarMuhammad2021DDCF}{article}{}
\name{author}{4}{}{%
{{hash=ee5704d66d59e3cff0ccd7340680b3cb}{%
family={Waqar},
familyi={W\bibinitperiod},
given={Muhammad},
giveni={M\bibinitperiod}}}%
{{hash=394c7290cf8ce4e9e957f8b00086ad41}{%
family={Bak},
familyi={B\bibinitperiod},
given={Geunyong},
giveni={G\bibinitperiod}}}%
{{hash=1f079894ae531411ed1de72354831c91}{%
family={Kwon},
familyi={K\bibinitperiod},
given={Junhyeong},
giveni={J\bibinitperiod}}}%
{{hash=5b2467e0abbadb6813f15043a1171386}{%
family={Baeg},
familyi={B\bibinitperiod},
given={Sanghyeon},
giveni={S\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{location}{1}{%
{Piscataway}%
}
\list{publisher}{1}{%
{IEEE}%
}
\strng{namehash}{0bdeb802bff85655b14b4864aea757ce}
\strng{fullhash}{eaa8d50f0a408c25fab46e0a4aafbb9f}
\strng{bibnamehash}{0bdeb802bff85655b14b4864aea757ce}
\strng{authorbibnamehash}{0bdeb802bff85655b14b4864aea757ce}
\strng{authornamehash}{0bdeb802bff85655b14b4864aea757ce}
\strng{authorfullhash}{eaa8d50f0a408c25fab46e0a4aafbb9f}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{2169-3536}
\field{journaltitle}{IEEE access}
\field{title}{DDR4 Data Channel Failure Due to DC Offset Caused by Intermittent Solder Ball Fracture in FBGA Package}
\field{volume}{9}
\field{year}{2021}
\true{nocite}
\field{pages}{63002\bibrangedash 63011}
\range{pages}{10}
\keyw{Capacitors ; Couplings ; Printed circuits}
\endentry
\entry{AGESA_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{1}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 8-May-2024]}
\field{title}{AGESA --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2023}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=AGESA&oldid=1166805057
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=AGESA&oldid=1166805057
\endverb
\endentry
\entry{psp_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{2}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{AMD Platform Security Processor --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=AMD_Platform_Security_Processor&oldid=1216563013
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=AMD_Platform_Security_Processor&oldid=1216563013
\endverb
\endentry
\entry{wiki_bios}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{3}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=BIOS&oldid=1240397019}}
\field{note}{[Online; accessed 16-August-2024]}
\field{title}{BIOS --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\endentry
\entry{DDR3_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{4}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 8-May-2024]}
\field{title}{DDR3 SDRAM --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=DDR3_SDRAM&oldid=1207641521
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=DDR3_SDRAM&oldid=1207641521
\endverb
\endentry
\entry{free_soft_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{5}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 30-January-2024]}
\field{title}{Free software --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=Free_software&oldid=1196006316
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=Free_software&oldid=1196006316
\endverb
\endentry
\entry{fsf_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{6}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{Free Software Foundation --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=Free_Software_Foundation&oldid=1222269091
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=Free_Software_Foundation&oldid=1222269091
\endverb
\endentry
\entry{fs_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{7}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 29-January-2024]}
\field{title}{Free software movement --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=Free_software_movement&oldid=1197710495
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=Free_software_movement&oldid=1197710495
\endverb
\endentry
\entry{gfdl_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{8}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 30-January-2024]}
\field{title}{GNU Free Documentation License --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=GNU_Free_Documentation_License&oldid=1193649968
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=GNU_Free_Documentation_License&oldid=1193649968
\endverb
\endentry
\entry{gpl_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{9}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 30-January-2024]}
\field{title}{GNU General Public License --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=GNU_General_Public_License&oldid=1199241605
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=GNU_General_Public_License&oldid=1199241605
\endverb
\endentry
\entry{grub_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{10}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{GNU GRUB --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=GNU_GRUB&oldid=1217643156
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=GNU_GRUB&oldid=1217643156
\endverb
\endentry
\entry{gnu_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{11}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{GNU Project --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=GNU_Project&oldid=1205139455
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=GNU_Project&oldid=1205139455
\endverb
\endentry
\entry{ime_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{12}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{Intel Management Engine --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=1216703991
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=Intel_Management_Engine&oldid=1216703991
\endverb
\endentry
\entry{lip6_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{13}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{Laboratoire d'Informatique de Paris 6 --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=Laboratoire_d%27Informatique_de_Paris_6&oldid=1222525180
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=Laboratoire_d%27Informatique_de_Paris_6&oldid=1222525180
\endverb
\endentry
\entry{NDA_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{14}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 8-May-2024]}
\field{title}{Non-disclosure agreement --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2023}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=Non-disclosure_agreement&oldid=1183749255
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=Non-disclosure_agreement&oldid=1183749255
\endverb
\endentry
\entry{northbridge_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{15}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=Northbridge_(computing)&oldid=1231509957}}
\field{note}{[Online; accessed 17-August-2024]}
\field{title}{Northbridge (computing) --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\endentry
\entry{openbmc_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{16}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 8-May-2024]}
\field{title}{OpenBMC --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2023}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=OpenBMC&oldid=1183698628
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=OpenBMC&oldid=1183698628
\endverb
\endentry
\entry{seabios_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{17}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{SeaBIOS --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2023}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=SeaBIOS&oldid=1179465237
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=SeaBIOS&oldid=1179465237
\endverb
\endentry
\entry{southbridge_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{18}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{howpublished}{\url{https://en.wikipedia.org/w/index.php?title=Southbridge_(computing)&oldid=1239483618}}
\field{note}{[Online; accessed 17-August-2024]}
\field{title}{Southbridge (computing) --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\endentry
\entry{4freedom_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{19}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 29-January-2024]}
\field{title}{The Free Software Definition --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2023}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=The_Free_Software_Definition&oldid=1192713194
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=The_Free_Software_Definition&oldid=1192713194
\endverb
\endentry
\entry{osd_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{20}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 30-January-2024]}
\field{title}{The Open Source Definition --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2023}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=The_Open_Source_Definition&oldid=1191447775
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=The_Open_Source_Definition&oldid=1191447775
\endverb
\endentry
\entry{x86_wiki}{misc}{}
\name{author}{1}{}{%
{{hash=b6aea1a416c89509a7df1cbb69249cb6}{%
family={{Wikipedia contributors}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{fullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{bibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorbibnamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authornamehash}{b6aea1a416c89509a7df1cbb69249cb6}
\strng{authorfullhash}{b6aea1a416c89509a7df1cbb69249cb6}
\field{extraname}{21}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{[Online; accessed 7-May-2024]}
\field{title}{X86 --- {Wikipedia}{,} The Free Encyclopedia}
\field{year}{2024}
\true{nocite}
\verb{urlraw}
\verb https://en.wikipedia.org/w/index.php?title=X86&oldid=1221800539
\endverb
\verb{url}
\verb https://en.wikipedia.org/w/index.php?title=X86&oldid=1221800539
\endverb
\endentry
\entry{winbond}{manual}{}
\name{author}{1}{}{%
{{hash=506790477fe03844712a0c66579f17d0}{%
family={{Winbond Electronics Corporation}},
familyi={W\bibinitperiod}}}%
}
\strng{namehash}{506790477fe03844712a0c66579f17d0}
\strng{fullhash}{506790477fe03844712a0c66579f17d0}
\strng{bibnamehash}{506790477fe03844712a0c66579f17d0}
\strng{authorbibnamehash}{506790477fe03844712a0c66579f17d0}
\strng{authornamehash}{506790477fe03844712a0c66579f17d0}
\strng{authorfullhash}{506790477fe03844712a0c66579f17d0}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{note}{Accessed: 2024-08-17}
\field{title}{WINBOND W83667HG-A Datasheet}
\verb{urlraw}
\verb https://www.winbond.com/
\endverb
\verb{url}
\verb https://www.winbond.com/
\endverb
\endentry
\entry{wolf2006}{article}{}
\name{author}{1}{}{%
{{hash=e7ea35f3f0c3cf77495520fc0d8fdb22}{%
family={Wolf},
familyi={W\bibinitperiod},
given={K.},
giveni={K\bibinitperiod}}}%
}
\strng{namehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
\strng{fullhash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
\strng{bibnamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
\strng{authorbibnamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
\strng{authornamehash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
\strng{authorfullhash}{e7ea35f3f0c3cf77495520fc0d8fdb22}
\field{sortinit}{W}
\field{sortinithash}{4315d78024d0cea9b57a0c6f0e35ed0d}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{journaltitle}{IEEE Computer Society}
\field{number}{5}
\field{title}{Modern Boot Firmware: Moving from BIOS to UEFI}
\field{volume}{39}
\field{year}{2006}
\field{pages}{42\bibrangedash 47}
\range{pages}{6}
\verb{doi}
\verb 10.1109/MC.2006.156
\endverb
\endentry
\entry{YiJinhui2021DoDS}{article}{}
\name{author}{3}{}{%
{{hash=a738e2c330fa8bb553322676f86cdd67}{%
family={Yi},
familyi={Y\bibinitperiod},
given={Jinhui},
giveni={J\bibinitperiod}}}%
{{hash=1ec6f5d17a25af4f2091741966c18325}{%
family={Wang},
familyi={W\bibinitperiod},
given={Mingfu},
giveni={M\bibinitperiod}}}%
{{hash=90c8def289747c02c6ba0fa10c44c4d4}{%
family={Bai},
familyi={B\bibinitperiod},
given={Lidong},
giveni={L\bibinitperiod}}}%
}
\list{language}{1}{%
{eng}%
}
\list{location}{1}{%
{Bristol}%
}
\list{publisher}{1}{%
{IOP Publishing}%
}
\strng{namehash}{f0fa6bd8023def40891dba2f4d00ecb2}
\strng{fullhash}{f0fa6bd8023def40891dba2f4d00ecb2}
\strng{bibnamehash}{f0fa6bd8023def40891dba2f4d00ecb2}
\strng{authorbibnamehash}{f0fa6bd8023def40891dba2f4d00ecb2}
\strng{authornamehash}{f0fa6bd8023def40891dba2f4d00ecb2}
\strng{authorfullhash}{f0fa6bd8023def40891dba2f4d00ecb2}
\field{sortinit}{Y}
\field{sortinithash}{fd67ad5a9ef0f7456bdd9aab10fe1495}
\field{labelnamesource}{author}
\field{labeltitlesource}{title}
\field{issn}{1742-6588}
\field{journaltitle}{Journal of physics. Conference series}
\field{number}{1}
\field{title}{Design of DDR3 SDRAM read-write controller based on FPGA}
\field{volume}{1846}
\field{year}{2021}
\true{nocite}
\field{pages}{12046\bibrangedash}
\range{pages}{-1}
\keyw{Cameras ; Optical fibers ; Physics ; Realtime . . .}
\endentry
\enddatalist
\endrefsection
\endinput