SERHIIENKO, A. Maliciously created hardware. Information Technology and Security, [S. l.], v. 1, n. 1, p. 93–100, 2012. DOI: 10.20535/2411-1031.2012.1.1.53678. Disponível em: http://its.iszzi.kpi.ua/article/view/53678. Acesso em: 23 sep. 2021.