1. National Institute of Standards, NIST: National Vulnerability Database,
http://nvd.nist.gov
(access time March 4, 2014)
2. Mitre: Vulnerability list,
http://cve.mitre.org/cve/cve.html
3. Bonkoski, A.J., Bielawski, R., Halderman, J.A.: Illuminating the Security Issues Surrounding Lights-out Server Management. In: Proceedings of the 7th USENIX Conference on Offensive Technologies (WOOT 2013) (2013)
4. Duflot, L., Perez, Y.A.: Can You Still Trust Your Network Card? In: Proceedings of the 13th CanSecWest Conference (CanSecWest 2010) (2010)
5. Chen, K.: Reversing and Exploiting an Apple Firmware Update. Black Hat (2009)