1. Andrews, J.R.: Co-verification of Hardware and Software for ARM SoC Design. Elsevier (2005)
2. Casper, W.D., Papa, S.M.: Root of trust. In: Encyclopedia of Cryptography and Security, 2nd Ed, pp. 1057–1060. Springer (2011). https://doi.org/10.1007/978-1-4419-5906-5_789
3. Gigerl, B., Hadzic, V., Primas, R., Mangard, S., Bloem, R.: Coco: Co-design and co-verification of masked software implementations on CPUs. In: Proceedings of the 30th USENIX Security Symposium (USENIX Security 2021). pp. 1469–1468 (Aug 2021), https://www.usenix.org/conference/usenixsecurity21/presentation/gigerl
4. Google: Advisory: Security issue with Bluetooth Low Energy (BLE) Titan security keys. Google Security Blog (May 2019), https://security.googleblog.com/2019/05/titan-keys-update.html, web page, last accessed 21 august 2021
5. Huang, B., Ray, S., Gupta, A., Fung, J.M., Malik, S.: Formal security verification of concurrent firmware in SoCs using instruction-level abstraction for hardware. In: Proceedings of the 55th Annual Design Automation Conference (DAC 2018). pp. 91:1–91:6 (2018). https://doi.org/10.1145/3195970.3196055