Here is one way for an application to resist being executed on a system where it cannot guard its reputation nor collect due rent.

The software comes encrypted by a symmetric key known to those platforms built by someone with an agreement with the software vendor. The software is delivered to the platform vendor who encrypts it. This scheme needs tamper resistant hardware to protect the secret. I hate to say it but a bit of security thru obscurity might by partially viable here.