{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:32:14Z","timestamp":1750221134167,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1837127"],"award-info":[{"award-number":["1837127"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3317550.3321449","type":"proceedings-article","created":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T19:01:58Z","timestamp":1557514918000},"page":"37-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["RedLeaf"],"prefix":"10.1145","author":[{"given":"Vikram","family":"Narayanan","sequence":"first","affiliation":[{"name":"University of California, Irvine"}]},{"given":"Marek S.","family":"Baranowski","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"Leonid","family":"Ryzhyk","sequence":"additional","affiliation":[{"name":"VMware Research"}]},{"given":"Zvonimir","family":"Rakamari\u0107","sequence":"additional","affiliation":[{"name":"University of Utah"}]},{"given":"Anton","family":"Burtsev","sequence":"additional","affiliation":[{"name":"University of California, Irvine"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Intel Security Advisory. 2018. Bluetooth pairing vulnerability. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00128.html.  Intel Security Advisory. 2018. Bluetooth pairing vulnerability. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00128.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Intel Security Advisory. 2018. BMC Firmware Vulnerability Intel Server Boards Compute Modules and Systems. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00130.html.  Intel Security Advisory. 2018. BMC Firmware Vulnerability Intel Server Boards Compute Modules and Systems. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00130.html."},{"key":"e_1_3_2_1_3_1","unstructured":"Intel Security Advisory. 2018. DCI Policy Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00127.html.  Intel Security Advisory. 2018. DCI Policy Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00127.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel Security Advisory. 2018. EDK II Untested memory not covered by SMM page protection. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00159.html.  Intel Security Advisory. 2018. EDK II Untested memory not covered by SMM page protection. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00159.html."},{"key":"e_1_3_2_1_5_1","unstructured":"Intel Security Advisory. 2018. Firmware Authentication Bypass. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00152.html.  Intel Security Advisory. 2018. Firmware Authentication Bypass. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00152.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Intel Security Advisory. 2018. Insecure Handling of BIOS and AMT Passwords. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00160.html.  Intel Security Advisory. 2018. Insecure Handling of BIOS and AMT Passwords. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00160.html."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel Security Advisory. 2018. Intel 2G Firmware Update for Modems using ETWS. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00116.html.  Intel Security Advisory. 2018. Intel 2G Firmware Update for Modems using ETWS. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00116.html."},{"key":"e_1_3_2_1_8_1","unstructured":"Intel Security Advisory. 2018. Intel Active Management Technology 9.x\/10.x\/11.x\/12.x Security Review Cumulative Update Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00141.html.  Intel Security Advisory. 2018. Intel Active Management Technology 9.x\/10.x\/11.x\/12.x Security Review Cumulative Update Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00141.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Intel Security Advisory. 2018. Intel Baseboard Management Controller (BMC) firmware Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00149.html.  Intel Security Advisory. 2018. Intel Baseboard Management Controller (BMC) firmware Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00149.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Intel Security Advisory. 2018. Intel Converged Security Management Engine (Intel CSME) 11.x issue. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00118.html.  Intel Security Advisory. 2018. Intel Converged Security Management Engine (Intel CSME) 11.x issue. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00118.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Intel Security Advisory. 2018. Intel CSME Assets Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00125.html.  Intel Security Advisory. 2018. Intel CSME Assets Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00125.html."},{"key":"e_1_3_2_1_12_1","unstructured":"Intel Security Advisory. 2018. Intel NUC BIOS SW SMI Call-Out. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00110 html.  Intel Security Advisory. 2018. Intel NUC BIOS SW SMI Call-Out. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00110 html."},{"key":"e_1_3_2_1_13_1","unstructured":"Intel Security Advisory. 2018. Intel NUC Firmware Security Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00176.html.  Intel Security Advisory. 2018. Intel NUC Firmware Security Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00176.html."},{"key":"e_1_3_2_1_14_1","unstructured":"Intel Security Advisory. 2018. Intel Platform Trust Technology (PTT) Update Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00142.html.  Intel Security Advisory. 2018. Intel Platform Trust Technology (PTT) Update Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00142.html."},{"key":"e_1_3_2_1_15_1","unstructured":"Intel Security Advisory. 2018. Intel Q118 Intel Active Management Technology 9.x\/10.x\/11.x Security Review Cumulative Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00112 html.  Intel Security Advisory. 2018. Intel Q118 Intel Active Management Technology 9.x\/10.x\/11.x Security Review Cumulative Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00112 html."},{"key":"e_1_3_2_1_16_1","unstructured":"Intel Security Advisory. 2018. Intel Server Board Firmware Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00138 html.  Intel Security Advisory. 2018. Intel Server Board Firmware Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00138 html."},{"key":"e_1_3_2_1_17_1","unstructured":"Intel Security Advisory. 2018. Intel Server Board TPM Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00148 html.  Intel Security Advisory. 2018. Intel Server Board TPM Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00148 html."},{"key":"e_1_3_2_1_18_1","unstructured":"Intel Security Advisory. 2018. Intel Server Boards Firmware Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00179 html.  Intel Security Advisory. 2018. Intel Server Boards Firmware Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00179 html."},{"key":"e_1_3_2_1_19_1","unstructured":"Intel Security Advisory. 2018. Platform firmware included insecure handling of certain UEFI variables. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00158.html.  Intel Security Advisory. 2018. Platform firmware included insecure handling of certain UEFI variables. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00158.html."},{"key":"e_1_3_2_1_20_1","unstructured":"Intel Security Advisory. 2018. Power Management Controller (PMC) Security Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00131.html.  Intel Security Advisory. 2018. Power Management Controller (PMC) Security Advisory. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00131.html."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103006"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11804192_17"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1108792.1108813"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831211.2831219"},{"key":"e_1_3_2_1_25_1","unstructured":"Catalin Cimpanu. 2018. New Spectre Attack Recovers Data From a CPU's Protected SMM Mode. https:\/\/www.bleepingcomput.er.com\/news\/security\/new-spectre-attack-recovers-data-from-a-cpus-protected-smm-mode\/.  Catalin Cimpanu. 2018. New Spectre Attack Recovers Data From a CPU's Protected SMM Mode. https:\/\/www.bleepingcomput.er.com\/news\/security\/new-spectre-attack-recovers-data-from-a-cpus-protected-smm-mode\/."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480921"},{"key":"e_1_3_2_1_27_1","volume-title":"Intel Forums: What is Intel Innovation Engine? https:\/\/forums.intel.com\/s\/question\/0D50P000049060MSAQ\/what-is-innovation-engine.","author":"Intel Corporation","year":"2016","unstructured":"Intel Corporation . 2016 . Intel Forums: What is Intel Innovation Engine? https:\/\/forums.intel.com\/s\/question\/0D50P000049060MSAQ\/what-is-innovation-engine. Intel Corporation. 2016. Intel Forums: What is Intel Innovation Engine? https:\/\/forums.intel.com\/s\/question\/0D50P000049060MSAQ\/what-is-innovation-engine."},{"key":"e_1_3_2_1_28_1","unstructured":"Intel Corporation. 2017. What is Intel Management Engine? https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000008927\/software\/chipset-software.html.  Intel Corporation. 2017. What is Intel Management Engine? https:\/\/www.intel.com\/content\/www\/us\/en\/support\/articles\/000008927\/software\/chipset-software.html."},{"key":"e_1_3_2_1_29_1","unstructured":"Intel Corporation. 2018. Intel Pentium Silver and Intel Celeron Processors. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/silver-celeron-datasheet-vol-1.pdf.  Intel Corporation. 2018. Intel Pentium Silver and Intel Celeron Processors. https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/product-briefs\/silver-celeron-datasheet-vol-1.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_32_1","unstructured":"Android Developers. 2018. Trusty TEE. https:\/\/source.android.com\/security\/trusty.  Android Developers. 2018. Trusty TEE. https:\/\/source.android.com\/security\/trusty."},{"key":"e_1_3_2_1_33_1","unstructured":"Coq Developers. 2018. The Coq Proof Assistant. https:\/\/coq.inria.fr.  Coq Developers. 2018. The Coq Proof Assistant. https:\/\/coq.inria.fr."},{"key":"e_1_3_2_1_34_1","unstructured":"LinuxBoot Developers. 2019. Linux as Firmware. https:\/\/linuxboot.org.  LinuxBoot Developers. 2019. Linux as Firmware. https:\/\/linuxboot.org."},{"key":"e_1_3_2_1_35_1","unstructured":"McSema Developers. 2018. Framework for Lifting x86 AMD64 and AArch64 Program Binaries to LLVM Bitcode. https:\/\/github.com\/trailofbits\/mcsema.  McSema Developers. 2018. Framework for Lifting x86 AMD64 and AArch64 Program Binaries to LLVM Bitcode. https:\/\/github.com\/trailofbits\/mcsema."},{"key":"e_1_3_2_1_36_1","unstructured":"SMACK Developers. 2018. SMACK Software Verifier and Verification Toolchain. http:\/\/smackers.github.io.  SMACK Developers. 2018. SMACK Software Verifier and Verification Toolchain. http:\/\/smackers.github.io."},{"key":"e_1_3_2_1_37_1","unstructured":"The LK Developers. 2019. The LK embedded kernel. https:\/\/github.com\/littlekernel\/lk.  The LK Developers. 2019. The LK embedded kernel. https:\/\/github.com\/littlekernel\/lk."},{"key":"e_1_3_2_1_38_1","unstructured":"The Tock OS Developers. 2018. Tock Embedded Operating system. https:\/\/www.tockos.org.  The Tock OS Developers. 2018. Tock Embedded Operating system. https:\/\/www.tockos.org."},{"key":"e_1_3_2_1_39_1","unstructured":"Lo\u00efc Duflot Olivier Levillain Benjamin Morin and Olivier Grumelard. 2009. Getting into the SMRAM: SMM Reloaded. https:\/\/cansecwest.com\/csw09\/csw09-duflot.pdf.  Lo\u00efc Duflot Olivier Levillain Benjamin Morin and Olivier Grumelard. 2009. Getting into the SMRAM: SMM Reloaded. https:\/\/cansecwest.com\/csw09\/csw09-duflot.pdf."},{"key":"e_1_3_2_1_40_1","unstructured":"Jakob Engblom. 2017. Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms. https:\/\/software.intel.com\/en-us\/blogs\/2017\/06\/06\/finding-bios-vulnerabilities-with-excite.  Jakob Engblom. 2017. Finding BIOS Vulnerabilities with Symbolic Execution and Virtual Platforms. https:\/\/software.intel.com\/en-us\/blogs\/2017\/06\/06\/finding-bios-vulnerabilities-with-excite."},{"key":"e_1_3_2_1_41_1","unstructured":"Facebook. 2015. Introducing OpenBMC: an Open Software Framework for Next-Generation System Management. https:\/\/code.fb.com\/open-source\/introducing-openbmc-an-open-software-framework-for-next-generation-system-management\/.  Facebook. 2015. Introducing OpenBMC: an Open Software Framework for Next-Generation System Management. https:\/\/code.fb.com\/open-source\/introducing-openbmc-an-open-software-framework-for-next-generation-system-management\/."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1090\/psapm\/019\/0235771"},{"volume-title":"Energy Efficient Servers: Blueprints for Data Center Optimization","author":"Gough Corey","key":"e_1_3_2_1_43_1","unstructured":"Corey Gough , Ian Steiner , and Winston Saunders . 2015. Energy Efficient Servers: Blueprints for Data Center Optimization . Apress . Corey Gough, Ian Steiner, and Winston Saunders. 2015. Energy Efficient Servers: Blueprints for Data Center Optimization. Apress."},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI). 653--669","author":"Gu Ronghui","year":"2016","unstructured":"Ronghui Gu , Zhong Shao , Hao Chen , Xiongnan Wu , Jieung Kim , Vilhelm Sj\u00f6berg , and David Costanzo . 2016 . CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels . In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI). 653--669 . Ronghui Gu, Zhong Shao, Hao Chen, Xiongnan Wu, Jieung Kim, Vilhelm Sj\u00f6berg, and David Costanzo. 2016. CertiKOS: An Extensible Architecture for Building Certified Concurrent OS Kernels. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI). 653--669."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815428"},{"key":"e_1_3_2_1_46_1","volume-title":"Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 165--181","author":"Hawblitzel Chris","year":"2014","unstructured":"Chris Hawblitzel , Jon Howell , Jacob R Lorch , Arjun Narayan , Bryan Parno , Danfeng Zhang , and Brian Zill . 2014 . Ironclad Apps: End-to-End Security via Automated Full-System Verification . In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 165--181 . Chris Hawblitzel, Jon Howell, Jacob R Lorch, Arjun Narayan, Bryan Parno, Danfeng Zhang, and Brian Zill. 2014. Ironclad Apps: End-to-End Security via Automated Full-System Verification. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI). 165--181."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1243418.1243424"},{"key":"e_1_3_2_1_49_1","unstructured":"Intel. {n. d.}. The EFI Development Kit II (EDKII) Project. https:\/\/github.com\/tianocore\/tianocore.github.io\/wiki\/EDK-II.  Intel. {n. d.}. The EFI Development Kit II (EDKII) Project. https:\/\/github.com\/tianocore\/tianocore.github.io\/wiki\/EDK-II."},{"key":"e_1_3_2_1_50_1","unstructured":"Intel Security Advisory. 2017. Intel Active Management Technology Intel Small Business Technology and Intel Standard Manageability Escalation of Privilege. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00075.html.  Intel Security Advisory. 2017. Intel Active Management Technology Intel Small Business Technology and Intel Standard Manageability Escalation of Privilege. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00075.html."},{"key":"e_1_3_2_1_51_1","unstructured":"Intel Security Advisory. 2018. Intel Q317 ME 6.x\/7.x\/8.x\/9.x\/10.x\/11.x SPS 4.0 and TXE 3.0 Security Review Cumulative Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00086.html.  Intel Security Advisory. 2018. Intel Q317 ME 6.x\/7.x\/8.x\/9.x\/10.x\/11.x SPS 4.0 and TXE 3.0 Security Review Cumulative Update. https:\/\/www.intel.com\/content\/www\/us\/en\/security-center\/advisory\/intel-sa-00086.html."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158154"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"e_1_3_2_1_54_1","unstructured":"K. Rustan M. Leino. 2008. This is Boogie 2. https:\/\/www.microsoft.com\/en-us\/research\/publication\/this-is-boogie-2-2  K. Rustan M. Leino. 2008. This is Boogie 2. https:\/\/www.microsoft.com\/en-us\/research\/publication\/this-is-boogie-2-2"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17511-4_20"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3124680.3124717"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-54876-0_9"},{"key":"e_1_3_2_1_58_1","unstructured":"Mark Ermolov. 2018. Twitter. https:\/\/twitter.com\/_markel_\/status\/982364102449393668.  Mark Ermolov. 2018. Twitter. https:\/\/twitter.com\/_markel_\/status\/982364102449393668."},{"key":"e_1_3_2_1_59_1","first-page":"594","article-title":"Interface for Communication Between Circuit Blocks of an Integrated Circuit and Associated Apparatuses, Systems, and Methods","volume":"9","author":"Mejia Ivan Herrera","year":"2017","unstructured":"Ivan Herrera Mejia and Zeev Often . 2017 . Interface for Communication Between Circuit Blocks of an Integrated Circuit and Associated Apparatuses, Systems, and Methods . US Patent 9 , 594 ,413. Ivan Herrera Mejia and Zeev Often. 2017. Interface for Communication Between Circuit Blocks of an Integrated Circuit and Associated Apparatuses, Systems, and Methods. US Patent 9,594,413.","journal-title":"US Patent"},{"key":"e_1_3_2_1_60_1","unstructured":"Ronald Minnich. 2017. Replace Your Exploit-Ridden Firmware with Linux. Open Source Summit Europe + ELC Europe. https:\/\/www.youtube.com\/watch?v=iffTJ1vPCSo.  Ronald Minnich. 2017. Replace Your Exploit-Ridden Firmware with Linux. Open Source Summit Europe + ELC Europe. https:\/\/www.youtube.com\/watch?v=iffTJ1vPCSo."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132748"},{"key":"e_1_3_2_1_62_1","unstructured":"Big Switch Networks. 2019. Open Net Linux - Hardware Support and Certification. https:\/\/www.opennetlinux.org\/hcl.  Big Switch Networks. 2019. Open Net Linux - Hardware Support and Certification. https:\/\/www.opennetlinux.org\/hcl."},{"key":"e_1_3_2_1_63_1","unstructured":"Big Switch Networks. 2019. Open Network Linux. http:\/\/opennetlinux.org\/.  Big Switch Networks. 2019. Open Network Linux. http:\/\/opennetlinux.org\/."},{"key":"e_1_3_2_1_64_1","unstructured":"Niko Matsakis. 2016. Introducing MIR. https:\/\/blog.rust-lang.org\/2016\/04\/19\/MIR.html.  Niko Matsakis. 2016. Introducing MIR. https:\/\/blog.rust-lang.org\/2016\/04\/19\/MIR.html."},{"key":"e_1_3_2_1_65_1","unstructured":"OpenSwitch. 2019. OpenSwitch (OPX) Network Operating System. https:\/\/www.openswitch.net\/.  OpenSwitch. 2019. OpenSwitch (OPX) Network Operating System. https:\/\/www.openswitch.net\/."},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 203--216","author":"Panda Aurojit","year":"2016","unstructured":"Aurojit Panda , Sangjin Han , Keon Jang , Melvin Walls , Sylvia Ratnasamy , and Scott Shenker . 2016 . NetBricks: Taking the V Out of NFV . In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 203--216 . Aurojit Panda, Sangjin Han, Keon Jang, Melvin Walls, Sylvia Ratnasamy, and Scott Shenker. 2016. NetBricks: Taking the V Out of NFV. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 203--216."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797022.2797042"},{"key":"e_1_3_2_1_68_1","volume-title":"Open Compute Networking Project Workshop. https:\/\/www.opencompute.org\/wiki\/Networking\/Workshop-2014-07","author":"Project Open Compute","year":"2014","unstructured":"Open Compute Project . 2014 . Open Compute Networking Project Workshop. https:\/\/www.opencompute.org\/wiki\/Networking\/Workshop-2014-07 . Open Compute Project. 2014. Open Compute Networking Project Workshop. https:\/\/www.opencompute.org\/wiki\/Networking\/Workshop-2014-07."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08867-9_7"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-93900-9_24"},{"key":"e_1_3_2_1_71_1","volume-title":"Intel ME: The Way of the Static Analysis. https:\/\/www.troopers.de\/troopers17\/talks\/772-intel-me-the-way-of-the-static-analysis\/.","author":"Sklyarov Dmitry","year":"2017","unstructured":"Dmitry Sklyarov . 2017 . Intel ME: The Way of the Static Analysis. https:\/\/www.troopers.de\/troopers17\/talks\/772-intel-me-the-way-of-the-static-analysis\/. Dmitry Sklyarov. 2017. Intel ME: The Way of the Static Analysis. https:\/\/www.troopers.de\/troopers17\/talks\/772-intel-me-the-way-of-the-static-analysis\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Alexander Tereshkin and Rafal Wojtczuk. 2009. Introducing Ring -3 Rootkits. https:\/\/invisiblethingslab.com\/resources\/bh09usa\/Ring-3Rootkits.pdf.  Alexander Tereshkin and Rafal Wojtczuk. 2009. Introducing Ring -3 Rootkits. https:\/\/invisiblethingslab.com\/resources\/bh09usa\/Ring-3Rootkits.pdf."},{"key":"e_1_3_2_1_73_1","unstructured":"Rafal Wojtczuk and Joanna Rutkowska. 2009. Attacking Intel Trusted Execution Technology. https:\/\/invisiblethingslab.com\/resources\/bh09dc\/AttackingIntelTXT-paper.pdf.  Rafal Wojtczuk and Joanna Rutkowska. 2009. Attacking Intel Trusted Execution Technology. https:\/\/invisiblethingslab.com\/resources\/bh09dc\/AttackingIntelTXT-paper.pdf."},{"key":"e_1_3_2_1_74_1","unstructured":"Rafal Wojtczuk and Joanna Rutkowska. 2009. Attacking SMM Memory via Intel CPU Cache Poisoning. https:\/\/invisiblethingslab.com\/resources\/misc09\/smm_cache_fun.pdf.  Rafal Wojtczuk and Joanna Rutkowska. 2009. Attacking SMM Memory via Intel CPU Cache Poisoning. https:\/\/invisiblethingslab.com\/resources\/misc09\/smm_cache_fun.pdf."},{"key":"e_1_3_2_1_75_1","unstructured":"Rafal Wojtczuk and Joanna Rutkowska. 2011. Attacking Intel TXT via SINIT Code Execution Hijacking. https:\/\/invisiblethingslab.com\/resources\/2011\/Attacking_Intel_TXT_via_SINIT_hijacking.pdf.  Rafal Wojtczuk and Joanna Rutkowska. 2011. Attacking Intel TXT via SINIT Code Execution Hijacking. https:\/\/invisiblethingslab.com\/resources\/2011\/Attacking_Intel_TXT_via_SINIT_hijacking.pdf."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_4"}],"event":{"name":"HotOS '19: Workshop on Hot Topics in Operating Systems","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Bertinoro Italy","acronym":"HotOS '19"},"container-title":["Proceedings of the Workshop on Hot Topics in Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317550.3321449","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317550.3321449","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317550.3321449","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:27Z","timestamp":1750208547000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317550.3321449"}},"subtitle":["Towards An Operating System for Safe and Verified Firmware"],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":75,"alternative-id":["10.1145\/3317550.3321449","10.1145\/3317550"],"URL":"https:\/\/doi.org\/10.1145\/3317550.3321449","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}