1. M. Ammar and B. Crispo , Verify&revive: Secure detection and recovery of compromised low-end embedded devices," in Annual Computer Security Applications Conference, (New York, NY), p. 717--732 , ACM , 2020 . M. Ammar and B. Crispo, Verify&revive: Secure detection and recovery of compromised low-end embedded devices," in Annual Computer Security Applications Conference, (New York, NY), p. 717--732, ACM, 2020.
2. S The Security MicroVisor: A Formally-Verified Software-Based Security Architecture for the Internet of Things
3. M. Grisafi , M. Ammar , M. Roveri , and B. Crispo , PISTIS: Trusted computing architecture for low-end embedded systems," in 31st USENIX Security Symposium, (Boston , MA) , pp. 3843 -- 3860 , Aug. 2022 . M. Grisafi, M. Ammar, M. Roveri, and B. Crispo, PISTIS: Trusted computing architecture for low-end embedded systems," in 31st USENIX Security Symposium, (Boston, MA), pp. 3843--3860, Aug. 2022.
4. T. C. Group , TCG specification architecture overview." https://trustedcomputinggroup. org/wp-content/uploads/TCG\_1\_4\ _Architecture\_Overview.pdf , 2007 . [Online - Accessed on 11--11--2022]. T. C. Group, TCG specification architecture overview." https://trustedcomputinggroup. org/wp-content/uploads/TCG\_1\_4\ _Architecture\_Overview.pdf, 2007. [Online - Accessed on 11--11--2022].
5. V. Costan and S. Devadas , Intel sgx explained." Cryptology ePrint Archive , Paper 2016/086 , 2016 . https: //eprint.iacr.org/2016/086. V. Costan and S. Devadas, Intel sgx explained." Cryptology ePrint Archive, Paper 2016/086, 2016. https: //eprint.iacr.org/2016/086.