1. Business Software Alliance: BSA global software survey (2016).
http://globalstudy.bsa.org/2016/index.html
2. Akhunzada, A., et al.: Man-at-the-end attacks: analysis, taxonomy, human aspects, motivation and future directions. J. Netw. Comput. Appl. 48, 44–57 (2015)
3. Collberg, C., Thomborson, C.: Software watermarking: models and dynamic embeddings. In: Proceedings of the 26th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pp. 311–324. ACM (1999)
4. Nagra, J., Collberg, C.: Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Pearson Education (2009)
5. Arnautov, S., et al.: Scone: secure Linux containers with Intel SGX. In: USENIX Symposium on Operating Systems Design and Implementation, vol. 16, pp. 689–703. USENIX Association (2016)