1. Arcangeli, A.: aa.git repository. https://git.kernel.org/pub/scm/linux/kernel/git/andrea/aa.git/. Accessed 17 Sept 2019
2. Bauer, J., Gruhn, M., Freiling, F.C.: Lest we forget: cold-boot attacks on scrambled DDR3 memory. Digit. Invest. 16, S65–S74 (2016)
3. Bernstein, D.J.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC, vol. 8, pp. 3–5 (2008)
4. Blass, E.O., Robertson, W.: TRESOR-HUNT: attacking CPU-bound encryption. In: Proceedings of the 28th Annual Computer Security Applications Conference, ACSAC 2012, pp. 71–78. ACM, New York (2012)
5. Carbone, R., Bean, C., Salois, M.: An in-depth analysis of the Cold Boot attack: can it be used for sound forensic memory acquisition? Technical report DRDC Valcartier TM 2010–296, Defence R&D Canada - Valcartier, January 2011