1. Kaspersky Security Bulletin 2015. https://securelist.com/files/2015/12/Kaspersky-Security-Bulletin-2015_ FINAL_EN.pdf.
2. Kasslin, K. and Lumpur, K., Kernel malware: The attack from within. http://nicolascormier.com/documentation/security/kasslin_kernel_malware_paper.pdf.
3. A Technical Breakdown of ModPOS. https://breakingmalware.com/malware/a-technical-breakdown-ofmodpos.
4. Zhang, X., van Doorn, L., Jaeger, T., Perez, R., and Sailer, R., Secure coprocessor-based intrusion detection, Proc. of the Tenth ACM SIGOPS European Workshop, 2002.
5. Petroni, N. and Fraser, T., Copilot–a coprocessor-based kernel runtime integrity monitor, Proc. of the 13th Conference on USENIX Security Symposium, 2004.