1. Thomas Alsop. 2022. Arm's market share and targets across key technology markets in 2019 and 2028 fiscal years. https://www.statista.com/statistics/1132112/arm-market-share-targets/. Accessed 2022-11-13.
2. Amazon Web Services Inc. 2023. Floating IP pattern for HA between active-standby stateful servers. https://docs.aws.amazon.com/whitepapers/latest/real-time-communication-on-aws/floating-ip-pattern-for-ha-between-activestandby-stateful-servers.html. Accessed 2023-03-17.
3. Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J. Alex Halderman, Luca Invernizzi, Michalis Kallitsis, Deepak Kumar, Chaz Lever, Zane Ma, Joshua Mason, Damian Menscher, Chad Seaman, Nick Sullivan, Kurt Thomas, and Yi Zhou. 2017. Understanding the Mirai Botnet. In Proceedings of the 26th USENIX Security Symposium, USENIX Security '17. USENIX Association, 1093--1110. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
4. Arm Limited. 2004. About the TrustZone Protection Controller. https://developer.arm.com/documentation/dto0015/a/about-the-trustzone-protection-controller. Accessed 2023-11-20.
5. Arm Limited. 2010. CoreLink TrustZone Address Space Controller TZC-380 Technical Reference Manual r0p1. https://developer.arm.com/documentation/ddi0431/c/introduction/about-the-tzasc. Accessed 2023-11-20.