The precursor to the next stuxnet, 2011. ,
Compilers: Principles, Techniques and Tools, 2007. ,
Recognition of binary patterns by morphological analysis, 2012. ,
Morphological detection of malware, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE), 2008. ,
DOI : 10.1109/MALWARE.2008.4690851
URL : https://hal.archives-ouvertes.fr/inria-00330021
Architecture of a morphological malware detector, Journal in Computer Virology, vol.0, issue.4, pp.263-270, 2009. ,
DOI : 10.1007/s11416-008-0102-4
URL : https://hal.archives-ouvertes.fr/inria-00330022
Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005. ,
DOI : 10.1109/SP.2005.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.3399
Duqu? threat research and analysis, 2011. ,
An Algorithm for Subgraph Isomorphism, Journal of the ACM, vol.23, issue.1, pp.31-42, 1976. ,
DOI : 10.1145/321921.321925