References
- "SearchNetworking 2015 Purchasing Intentions Survey," TechTarget, May 2015.
- 김호원, 김동규, "IoT 기술과 보안," 정보보호학회지, 22(1), 2012년 2월, 7-13.
- Rob Coombs, "Designing Security & Trust into Connected Devices," ARM Techcon 2015.
- Fengwei Zhang and Hongwei Zhang, "SoK: A Study of Using Hardware-assisted Isolated Execution Environments for Security," HASP 2016.
- Ruby B. Lee, "Security Basics," HotChips 2014.
- David Lie, et al., "Architectural Support for Copy and Tamper Resistant Software," ASPLOS 2000.
- G. Edward Suh, et al., "Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions," ISCA 2005.
- Victor Costan, et al., "Sanctum: Minimal Hardware Extensions for Strong Software Isolation," Usenix Security Symposium, 2015.
- www.arm.com
- Igor Skochinsky, "Intel ME Secrets," RECON 2014.
- AMD TATS BIOS Development Group, "AMD Security and Server Innovation," UEFI Spring PlugFest, 2013.
- Victor Costan and Srinivas Devadas, "Intel SGX Explained," http://eprint.iacr.org/2016/086.pdf, 2016.
- Frank McKeen, et al., "Intel Software Guard Extensions (Intel SGX) SGX2," HASP 2016.