1. National Institute of Standards and Technology (NIST) Special Publication 800-193, Platform Firmware Resiliency Guidelines. Section 3.1, "Protection," states, "The goal of Protection is to ensure that platform firmware code and critical data remain in a state of integrity and are protected from corruption." This section details mechanisms like digital signatures to prevent unauthorized modifications.
2. National Institute of Standards and Technology (NIST) Special Publication 800-147B, BIOS Protection Guidelines for Servers. Section 3, "BIOS Protection Requirements," outlines mandatory security capabilities for BIOS, including requirements for "Secure BIOS Update" (Section 3.1) which mandates cryptographic authentication of all firmware updates to prevent unauthorized code from being installed.
3. Unified Extensible Firmware Interface (UEFI) Forum, UEFI Specification Version 2.9. Chapter 32, "Secure Boot and Driver Signing," describes the Secure Boot protocol, a core BIOS/UEFI protection feature. It is designed to "prevent the execution of unauthorized code during the boot sequence."
4. P. Karger, A. Safford, D. & Wheeler, L. (2004). A Retrospective on the VAX VMM Security Kernel. IEEE Transactions on Software Engineering. This academic paper discusses the foundational concepts of secure boot processes, which are a form of BIOS protection, emphasizing the need to protect the initial system state from modification. (Available via IEEE Xplore, DOI: 10.1109/TSE.2004.86). The principles discussed are foundational to modern BIOS protection.