Implementation and implications of a stealth hard-drive backdoorJonas ZaddachAnil Kurmuset al.2013ACSAC 2013
AccessMiner: Using system-centric models for malware protectionAndrea LanziDavide Balzarottiet al.2010CCS 2010