1. [1] Beniamini, G.: Android linux kernel privilege escalation vulnerability and exploit (CVE-2014-4322), blog-post (2015), available from <http://bits-please.blogspot.com/2015/08/android-linux-kernel-privilege.html> (accessed 2019-06-17).
2. [2] Beniamini, G.: Exploring Qualcomm's Secure Execution Environment, blog-post (2016), available from <http://bits-please.blogspot.com/2016/04/exploring-qualcomms-secure-execution.html> (accessed 2019-06-17).
3. [3] Beniamini, G.: QSEE privilege escalation vulnerability and exploit (CVE-2015-6639), blog-post (2016), available from <http://bits-please.blogspot.com/2016/05/qsee-privilege-escalation-vulnerability.html> (accessed 2019-06-17).
4. [4] Beniamini, G.: War of the Worlds - Hijacking the Linux Kernel from QSEE, blog-post (2016), available from <http://bits-please.blogspot.com/2016/05/war-of-worlds-hijacking-linux-kernel.html> (accessed 2019-06-17).
5. [5] Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B. and Wingers, L.: The SIMON and SPECK Families of Lightweight Block Ciphers, Cryptology ePrint Archive, Report 2013/404 (2013), available from <http://eprint.iacr.org/2013/404>.