. Android, Verified boot, https://source.android.com/security

D. Challener and W. Arthur, A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security, Apress, 2015.

O. Henniger, L. Apvrille, A. Fuchs, Y. Roudier, A. Ruddle et al., Security requirements for automotive on-board networks, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST), 2009.
DOI : 10.1109/ITST.2009.5399279

. Intel, Trusted Execution Technology 12 Intel: Software guard extensions programming reference (2014), https:// software.intel.com/sites, pp.329298-329300

. Linux-weekly and . News, The Integrity Measurement Architecture, https://lwn.net/ Articles, 137306.

C. Miller and C. Valasek, A Survey of Remote Automotive Attack Surfaces, p.Blackhat, 2014.

R. Wilkins and B. Richardson, UEFI Secure Boot in Modern Computer Security Solutions, Tech. rep., UEFI Forum, 2013.

J. Van-woudenberg, 20 ways past secure boot