Matthew Hicks, Murph Finnicum, Samuel T. King, Milo M. K. Martin, and Jonathan M. Smith, “Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically”, USENIX ;login, December 2010.