2GROSSSCHADL J , VEJDA T , PAGE D . Reassessing the TCG specifications for trusted computing in mobile and embedded systems [ C]//HOST 2008: IEEE International Workshop on Hardware-Oriented Security and Trust. Washington, DC: IEEE Press, 2008:84 - 90.
3SZYDLOWSKI C. The extensible firmware interface[ J]. Dr, Dobb's Journal, 2005, 30(9): 46-48.