Reference [2] investigates the "trusted hardware", the author
concludes that with the rapidly increasing reliance on
sophisticated hardware components, the attacks to hardware
devices, which will in turn result in security vulnerabilities of
the whole platform, are becoming more and more serious and
troublesome. So, some initiative and ongoing researches are
needed to solve this problem.