W. Duqu, The precursor to the next stuxnet, 2011.

A. Aho, M. Lam, R. Sethi, and J. Ullman, Compilers: Principles, Techniques and Tools, 2007.

G. Bonfante, J. Calvet, J. Marion, F. Sabatier, and A. Thierry, Recognition of binary patterns by morphological analysis, 2012.

G. Bonfante, M. Kaczmarek, and J. Marion, Morphological detection of malware, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008.
DOI : 10.1109/MALWARE.2008.4690851

URL : https://hal.archives-ouvertes.fr/inria-00330021

G. Bonfante, M. Kaczmarek, and J. Marion, Architecture of a morphological malware detector, Journal in Computer Virology, vol.0, issue.4, pp.263-270, 2009.
DOI : 10.1007/s11416-008-0102-4

URL : https://hal.archives-ouvertes.fr/inria-00330022

M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005.
DOI : 10.1109/SP.2005.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399

P. Szor, Duqu? threat research and analysis, 2011.

J. R. Ullmann, An Algorithm for Subgraph Isomorphism, Journal of the ACM, vol.23, issue.1, pp.31-42, 1976.
DOI : 10.1145/321921.321925