, VDM:Unstructured 4F 56 43 00 E8 04 9F B2 F5 F9 F1, vol.68, p.2

. Af-e5-aa,

G. Alendal, G. Dyrkolbotn, and S. Axelsson, Forensic acquisition -Analysis and circumvention of Samsung secure boot enforced common criteria mode, Digital Investigation, vol.24, pp.60-67, 2018.

G. Alendal, C. Kison, . Modg, H. W. Got, and . Crypto, On the (In)Security of a Self-Encrypting Drive Series, Cryptology ePrint Archive, 1002.

N. Artenstein, Exploiting Android S-Boot: Getting arbitrary code exec in the Samsung bootloader (1/2), Information Security Newspaper, 2017.

, Chindi.ap (commons.wikimedia.org/wiki/User:Chindi.ap), 2019.

H. Reydarns, V. Lauwereys, D. Haeseldonckx, P. Van-willigenburg, J. Woudstra et al., The development of a proof of concept for a smart DC/DC power plug based on USB Power Delivery, Proceedings of the Twenty-Second Conference on the Domestic Use of Energy, 2014.

, T10 Technical Committee of the International Committee on Information Technology Standards, SCSI Operation Codes, 2015.

, Getting a Vendor ID, 2019.