Lee, Micah (April 28, 2018). "It's Impossible to Prove Your Laptop Hasn't Been Hacked. I Spent Two Years Finding Out". The Intercept. Retrieved 2021-09-13. https://theintercept.com/2018/04/28/computer-malware-tampering/
Christensen, Jake; Anghel, Ionut Mugurel; Taglang, Rob; Chiroiu, Mihai; Sion, Radu (August 2020). "DECAF: automatic, adaptive de-bloating and hardening of COTS firmware" (PDF). SEC'20: Proceedings of the 29th USENIX Conference on Security Symposium. Retrieved January 22, 2024. https://www.usenix.org/system/files/sec20-christensen.pdf
Matrosov, Alex (2019). Rootkits and bootkits: reversing modern malware and next generation threats. Eugene Rodionov, Sergey Bratus. San Francisco: No Starch Press. pp. 380–390. ISBN 978-1-59327-883-0. OCLC 1005741834. 978-1-59327-883-0
de Assumpção, Matheus Bichara; dos Reis, Marcelo Abdalla; Marcondes, Marcos Roberto; da Silva Eleutério, Pedro Monteiro; Vieira, Victor Hugo (March 2023). "Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI". Forensic Science International: Digital Investigation. 44. doi:10.1016/j.fsidi.2023.301514. https://doi.org/10.1016%2Fj.fsidi.2023.301514
de Assumpção, Matheus Bichara; dos Reis, Marcelo Abdalla; Marcondes, Marcos Roberto; da Silva Eleutério, Pedro Monteiro; Vieira, Victor Hugo (March 2023). "Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI". Forensic Science International: Digital Investigation. 44. doi:10.1016/j.fsidi.2023.301514. https://doi.org/10.1016%2Fj.fsidi.2023.301514