1. P. Kocher, D. Genkin, D. Gruss, W. Haas, M. Hamburg, M. Lipp, S. Mangard, T. Prescher, M. Schwarz, Y. Yarom, Spectre attacks: exploiting speculative execution. Preprint. arXiv:1801.01203 (2018)
2. M. Lipp, M. Schwarz, D. Gruss, T. Prescher, W. Haas, S. Mangard, P. Kocher, D. Genkin, Y. Yarom, M. Hamburg, Meltdown. CoRR. abs/1801.01207 (2018)
3. S. Skorobogatov, C. Woods, Breakthrough silicon scanning discovers backdoor in military chip, in International Conference on Cryptographic Hardware and Embedded Systems (CHES) (Springer, Berlin, 2012), S. 23–40
4. H. Khattri, N. K. V. Mangipudi, S. Mandujano, HSDL: a security development lifecycle for hardware technologies, in IEEE International Symposium on Hardware Oriented Security and Trust (HOST) (IEEE, Piscataway, 2012), S. 116–121
5. A. Ardeshiricham, W. Hu, J. Marxen, R. Kastner, Register transfer level information flow tracking for provably secure hardware design, in Design, Automation and Test in Europe (DATE) (IEEE, Piscataway, 2017), S. 1691–1696