01.22.2015 - By Andrew Pontious and Wolf Rentzsch
Andrew on weak references and Wolf on physical-access malware like Thunderstrike.