1. Arm Limited: The trustzone hardware architecture (2021). https://developer.arm.com/documentation/100935/0100/The-TrustZone-hardware-architecture-?lang=en. Accessed 05 Jan 2021
2. Asanović, K., et al.: The rocket chip generator. Tech. rep., EECS Department, University of California, Berkeley, April 2016. http://www2.eecs.berkeley.edu/Pubs/TechRpts/2016/EECS-2016-17.html
3. Boone, J.: Tpm genie: attacking the hardware root of trust for less than \$50 (2018). Acessed 13 Feb 2019
4. Borrello, P., et al.: ÆPIC Leak: Architecturally leaking uninitialized data from the microarchitecture. In: USENIX Security 22 (2022)
5. Bourgeat, T., et al.: Mi6: Secure enclaves in a speculative out-of-order processor. In: MICRO ’52 (2019)