1. Alliance, B.S.: Software Management: Security Imperative, Business Opportunity. BSA Global Software Survey (2018)
2. Economics, F.: The economic impacts of counterfeiting and piracy. Report prepared for BASCAP and INTA. Recuperado de: https://www.inta.org/communications/documents/2017_frontier_report.pdf (2017)
3. Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL ’98), pp. 184–196. ACM Press (1998)
4. Collberg, C., Nagra, J.: Surreptitious Software. Addison Wesley (2010)
5. Davidson, R.L., Myhrvold, N.: Method and System for Generating and Auditing a Signature for a Computer Program. US Patent number 5,559,884 (1996)