M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti, Control-flow integrity, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, pp.340-353, 2005.
DOI : 10.1145/1102120.1102165

A. Tats-bios-development and . Group, AMD Security and Server innovation, 2013.

M. Ahmed, P. Azab, Z. Ning, X. Wang, X. Jiang et al., HyperSentry: enabling stealthy in-context measurement of hypervisor integrity, Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10, pp.38-49, 2010.

O. Bazhaniuk, Y. Bulygin, A. Furtak, M. Gorobets, J. Loucaides et al., A new class of vulnerabilities in SMI handlers, 2015.

F. Bellard, QEMU, a Fast and Portable Dynamic Translator, Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC '05). USENIX Association, pp.41-46, 2005.

N. Binkert, B. Beckmann, G. Black, K. Steven, A. Reinhardt et al., The gem5 simulator, ACM SIGARCH Computer Architecture News, vol.39, issue.2, pp.1-7, 2011.
DOI : 10.1145/2024716.2024718

T. Bletsch, X. Jiang, W. Vince, Z. Freeh, and . Liang, Jumporiented programming: a new class of code-reuse attack, Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS '11, pp.30-40, 2011.

Y. Bulygin, O. Bazhaniuk, A. Furtak, J. Loucaides, and M. Gorobets, BARing the System: New vulnerabilities in Coreboot & UEFI based systems, 2017.

Y. Bulygin and D. Samyde, Chipset based approach to detect virtualization malware, 2008.

N. Burow, A. Scott, J. Carr, P. Nash, M. Larsen et al., Control-Flow Integrity, ACM Computing Surveys, vol.50, issue.1, p.16, 2017.
DOI : 10.1007/978-3-319-26362-5_4

A. Butko, F. Bruguier, A. Gamatié, G. Sassatelli, D. Novo et al., Full-System Simulation of big. LITTLE Multicore Architecture for Performance and Energy Exploration, Proceedings of the 10th International Symposium on Embedded Multicore/Manycore Systems-on-Chip (MCSoC, pp.201-208, 2016.
URL : https://hal.archives-ouvertes.fr/lirmm-01418745

N. Carlini, A. Barresi, M. Payer, D. Wagner, R. Thomas et al., Control-flow bending: On the effectiveness of control-flow integrity, Proceedings of the 24th USENIX Security Symposium (SEC'15). USENIX Association, pp.161-176, 2015.

S. Checkoway, L. Davi, A. Dmitrienko, A. Sadeghi, H. Shacham et al., Return-oriented programming without returns, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pp.559-572, 2010.
DOI : 10.1145/1866307.1866370

URL : http://www.cse.ucsd.edu/%7Ehovav/dist/noret-ccs.pdf

Y. Choi, J. Cong, Z. Fang, Y. Hao, G. Reinman et al., A quantitative analysis on microarchitectures of modern CPU-FPGA platforms, Proceedings of the 53rd Annual Design Automation Conference on, DAC '16, 2016.
DOI : 10.1109/ICCAD.2015.7372648

L. Davi, M. Hanreich, D. Paul, A. Sadeghi, P. Koeberl et al., HAFIX, Proceedings of the 52nd Annual Design Automation Conference on, DAC '15, p.74, 2015.
DOI : 10.1145/1315245.1315313

L. Davi and F. Monrose, Stitching the gadgets: On the ineffectiveness of coarse-grained control-flow integrity protection, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, pp.401-416, 2014.

B. Delgado, L. Karen, and . Karavanic, Performance implications of System Management Mode, 2013 IEEE International Symposium on Workload Characterization (IISWC), pp.163-173, 2013.
DOI : 10.1109/IISWC.2013.6704682

L. Duflot, O. Levillain, B. Morin, and O. Grumelard, Getting into the SMRAM: SMM Reloaded, 2009.

S. Embleton, S. Sparks, and C. C. Zou, SMM rootkits, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1590-1605, 2013.
DOI : 10.1145/1460877.1460892

I. Evans, F. Long, U. Otgonbaatar, H. Shrobe, M. Rinard et al., Control Jujutsu, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS '15, pp.901-913, 2015.
DOI : 10.1109/SP.2009.25

I. Fratri?, ROPGuard: Runtime prevention of return-oriented programming attacks, 2012.

H. Fröning, M. Nüssle, H. Litz, C. Leber, and U. Brüning, On Achieving High Message Rates, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing, pp.498-505, 2013.
DOI : 10.1109/CCGrid.2013.43

S. Gallagher, Your USB cable, the spy: Inside the NSA's catalog of surveillance magic, 2013.

B. Holden, D. Anderson, J. Trodden, and M. Daves, Hyper- Transport 3.1 Interconnect Technology, 2008.

H. Inc, HP Sure Start: Automatic Firmware Intrusion Detection and Repair System, 2016.

H. Inc, HP Sure Start Gen3, 2017.

H. Inc, HP Sure Start with Runtime Intrusion Detection, 2009.

D. Jang, H. Lee, M. Kim, D. Kim, D. Kim et al., ATRA, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.167-178, 2014.
DOI : 10.1109/TIFS.2013.2266095

X. Kovah and C. Kallenberg, How Many Million BIOSes Would you Like to Infect? CanSecWest, 2015.

C. Lattner and V. Adve, LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., pp.75-88, 2004.
DOI : 10.1109/CGO.2004.1281665

C. Lattner, A. Lenharth, and V. Adve, Making Context- Sensitive Points-to Analysis with Heap Cloning Practical For The Real World, 2007.

H. Lee, H. Moon, D. Jang, K. Kim, J. Lee et al., KI-Mon: A Hardware-assisted Eventtriggered Monitoring Platform for Mutable Kernel Object, Proceedings of the 22th USENIX Security Symposium. USENIX Association, pp.511-526, 2013.

Y. Lee, I. Heo, D. Hwang, K. Kim, and Y. Paek, Towards a practical solution to detect code reuse attacks on ARM mobile devices, Proceedings of the Fourth Workshop on Hardware and Architectural Support for Security and Privacy, HASP '15, 2015.
DOI : 10.1145/1315245.1315260

P. Lin, Hacking Team Uses UEFI BIOS Rootkit to Keep RCS 9 Agent in Target Systems TrendLabs Security Intelligence Blog from https://blog.trendmicro.com/trendlabs-security-intelligence/ hacking-team-uses-uefi-bios-rootkit-to-keep-rcs-9-agent-in-target-systems, 2013.

H. Litz, H. Froening, M. Nuessle, and U. Bruening, VELO: A Novel Communication Engine for Ultra-Low Latency Message Transfers, 2008 37th International Conference on Parallel Processing, pp.238-245, 2008.
DOI : 10.1109/ICPP.2008.85

URL : http://ra.ziti.uni-heidelberg.de/pages/publications/papers/2008/1.pdf

H. Litz, M. Thuermer, and U. Bruening, TCCluster: A Cluster Architecture Utilizing the Processor Host Interface as a Network Interconnect, 2010 IEEE International Conference on Cluster Computing, 2010.
DOI : 10.1109/CLUSTER.2010.37

Z. Liu, J. Lee, J. Zeng, Y. Wen, Z. Lin et al., CPU Transparent Protection of OS Kernel and Hypervisor Integrity with Programmable DRAM, Proceedings of the 40th Annual International Symposium on Computer Architecture (ISCA '13, pp.392-403, 2013.

T. Mandt, M. Solnik, and D. Wang, Demystifying the Secure Enclave Processor, Black Hat Las Vegas, 2016.

D. Nicholas, F. S. Matsakis, and I. Klock, The Rust Language, Proceedings of the 2014 ACM SIGAda Annual Conference on High Integrity Language Technology (HILT '14, pp.103-104, 2014.

H. Moon, H. Lee, J. Lee, K. Kim, Y. Paek et al., Vigilare, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.28-37, 2012.
DOI : 10.1145/2382196.2382202

B. Niu and G. Tan, Modular control-flow integrity, ACM SIGPLAN Notices, vol.49, issue.6, pp.577-587, 2014.
DOI : 10.1145/2666356.2594295

D. Oleksiuk, Exploring and exploiting Lenovo firmware secrets, 2016.

N. L. Petroni, J. , T. Fraser, J. Molina, and W. A. Arbaugh, Copilot -a Coprocessor-based Kernel Runtime Integrity Monitor, Proceedings of the 13th USENIX Security Symposium. USENIX Association, pp.179-194, 2004.

L. Nick, T. Jr, A. Fraser, . Walters, A. William et al., An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data, Proceedings of the 15th USENIX Security Symposium. USENIX Association, 2006.

B. Pujos, SMM unchecked pointer vulnerability, 2016.

R. Roemer, E. Buchanan, H. Shacham, and S. Savage, Return-Oriented Programming, ACM Transactions on Information and System Security, vol.15, issue.1, p.1, 2012.
DOI : 10.1145/2133375.2133377

X. Ruan, Boot with Integrity, or Don't Boot In Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine, Apress, pp.143-163, 2014.

H. Benjamin and . Shelton, Popcorn Linux: enabling efficient inter-core communication in a Linux-based multikernel operating system. Master's thesis, 2013.

W. Song, J. Kim, J. Lee, and D. Abts, Security Vulnerability in Processor-Interconnect Router Design, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.358-368, 2014.
DOI : 10.1145/2485922.2485972

C. Tice, T. Roeder, P. Collingbourne, S. Checkoway, Ú. Erlingsson et al., Enforcing forward-edge controlflow integrity in gcc & llvm, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, pp.941-955, 2014.

Z. Wang and X. Jiang, HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity, 2010 IEEE Symposium on Security and Privacy, pp.380-395, 2010.
DOI : 10.1109/SP.2010.30

URL : http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND10.pdf

R. Wojtczuk and J. Rutkowska, Attacking SMM memory via Intel CPU cache poisoning, 2009.

Y. Xia, Y. Liu, H. Chen, and B. Zang, CFIMon: Detecting Violation of Control Flow Integrity Using Performance Counters, Proceedings of the 2012 42Nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN '12, pp.1-12, 2012.

J. Yao, V. Zimmer, and S. Zeng, A Tour Beyond BIOS Implementing UEFI Authenticated Variables in SMM with EDKII, 2014.

J. Yao, J. Vincent, and . Zimmer, A Tour Beyond BIOS Supporting an SMM Resource Monitor using the EFI Developer Kit II, 2015.

J. Yao, J. Vincent, M. Zimmer, and . Flemming, A Tour Beyond BIOS Memory Practices in UEFI, 2015.

M. Zhang and R. Sekar, Control Flow Integrity for COTS Binaries, Proceedings of the 22th USENIX Security Symposium. USENIX Association, pp.337-352, 2013.
DOI : 10.1145/2818000.2818016

URL : http://dl.acm.org/ft_gateway.cfm?id=2818016&type=pdf

X. Zhang, L. Van-doorn, T. Jaeger, R. Perez, and R. Sailer, Secure coprocessor-based intrusion detection, Proceedings of the 10th workshop on ACM SIGOPS European workshop: beyond the PC , EW10, pp.239-242, 2002.
DOI : 10.1145/1133373.1133423