A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007.
DOI : 10.1109/ACSAC.2007.21

E. Bhatkar, D. C. Duvarney, and R. Sekar, Address obfuscation: an efficient approach to combat a broad range of memory error exploits, Proc. of USENIX Security Symp, pp.105-120, 2003.

C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, 1997.

E. Damiani, S. De, and C. Vimercati, Computing range queries on obfuscated data, Proc. of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2004.

H. Flake, Structural comparison of executable objects, Proc. of the Conf. DIMVA, pp.161-173, 2004.

R. Giacobazzi and I. Mastroeni, Making Abstract Interpretation Incomplete: Modeling the Potency of Obfuscation, Static Analysis Symposium, pp.129-145
DOI : 10.1007/978-3-642-33125-1_11

Y. Guillot and A. Gazet, Automatic binary deobfuscation, Journal in Computer Virology, vol.2, issue.2, pp.261-276, 2010.
DOI : 10.1007/s11416-009-0126-4

T. Hagog, Cache aware data layout reorganization optimization in GCC, Proc. of the GCC Developers' Summit, 2005.

Z. Lin, R. D. Riley, and D. Xu, Polymorphing Software by Randomizing Data Structure Layout, Proc. of the Conf. DIMVA, pp.107-126, 2009.
DOI : 10.1007/978-3-540-87403-4_1

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.153.4174

C. Luk, R. Cohn, and R. Muth, Pin, ACM SIGPLAN Notices, vol.40, issue.6, pp.190-200, 2005.
DOI : 10.1145/1064978.1065034

A. Majumdar, A. Monsifrot, and C. Thomborson, On Evaluating Obfuscatory Strength of Alias-based Transforms using Static Analysis, 2006 International Conference on Advanced Computing and Communications, pp.605-610, 2006.
DOI : 10.1109/ADCOM.2006.4289963