1. [1] Arm ltd, technologies trustzone for cortex-m, 2021. https://www.arm.com/en/technologies/trustzone-for-cortex-m.
2. [2] Intel corp, intel security features and technologies related to transient execution attacks, 2021. https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/related-intel-security-features-technologies.html.
3. [3] T. Adegbija, A. Rogacs, C. Patel, and A. G. Ross. Microprocessor optimizations for the internet of things: A survey. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(1):7–20, 2018.
4. [4] M. Alam, S. Bhattacharya, D. Mukhopadhyay, and S. Bhattacharya. Performance counters to rescue: A machine learning based safeguard against micro-architectural side-channel-attacks. Cryptology ePrint Archive, Paper 2017/564, 2017. https://eprint.iacr.org/2017/564.
5. [5] M. B. Bahador, M. Abadi, and A. Tajoddin. Hpcmalhunter: Behavioral malware detection using hardware performance counters and singular value decomposition. In 2014 4th International Conference on Computer and Knowledge Engineering (ICCKE), pages 703–708, 2014.