1. Command Five. SK hack by an advanced persistent threat (2011). http://www.commandfive.com/papers/C5_APT_SKHack.pdf .
2. P Craig, Software Piracy Exposed—Secrets from the Dark Side Revealed, 1st edn. (Syngress Publishing, Rockland, 2005).
3. J Zhao, N Yao, S Cai, in Computer Science and Information Engineering, 2009 WRI World Congress On, 2. A new method to protect software from cracking (IEEE New York, 2009), pp. 636–638.
4. C Eagle, The IDA Pro Book: the Unofficial Guide to the World’s Most Popular Disassembler (No Starch Press, San Francisco, 2011).
5. M Abadi, M Budiu, Ú Erlingsson, J Ligatti, Control-flow integrity principles, implementations, and applications. Trans. Inform. Syst. Secur. (TISSEC). 13(1), 4:1–4.40 (2009).