1. Arnautov S, Trach B, Gregor F, Knauth T, Martin A, Priebe C, Lind J, Muthukumaran D, O'Keeffe D, Stillwell ML, Goltzsche D, Eyers D, Kapitza R, Pietzuch P, & Fetzer C (2016) SCONE: secure Linux containers with Intel SGX. In: 12th USENIX symposium on operating systems design and implementation (OSDI 16). USENIX Association, pp 689–703
2. Averbuch A, Kiperberg M, Zaidenberg N (2011) An efficient VM-based software protection. In: 2011 5th International conference on network and system security. IEEE, pp 121–128
3. Averbuch A, Kiperberg M, Zaidenberg N (2013) Truly-protect: an efficient VM-based software protection. IEEE Syst J 7(3):455–466
4. Ben Yehuda R, Zaidenberg N (2020a) The hyplet: Joining a program and a nanovisor for real-time and performance. In: 2020 International symposium on performance evaluation of computer and telecommunication systems, SPECTS 2020. IEEE, pp 1–8
5. Ben Yehuda R, Zaidenberg N (2020b) Protection against reverse engineering in ARM. Int J Inf Secur 19(1):39–51