1. Wójcik, B.: How to make cracker’s life harder. Anti piracy protections for programmers. https://www.pelock.com/articles/how-to-make-crackers-life-harder-anti-piracy-protections-for-programmers (2019)
2. Cloosters, T., Rodler, M., Davi, L.: TeeRex: discovery and exploitation of memory corruption vulnerabilities in SGX enclaves. In: 29th USENIX Security Symposium (2020)
3. Wang, W., Liu, W., Chen, H., Wang, X., Tian, H., Lin, D.: Trust beyond border: lightweight, verifiable user isolation for protecting in-enclave services. IEEE Trans. Dependable Secure Comput. 20, 522–538 (2021)
4. D’Agostino, B., Khan, O.: Seeds of SEED: characterizing enclavelevel parallelism in secure multicore processors. In: 2021 International Symposium on Secure and Private Execution Environment Design (SEED), pp. 203–209 (2021)
5. Youren, S., et al.: Occlum: secure and efficient muvltitasking inside a single enclave of Intel SGX. In: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems (2020)