]. S. Alrabaee, P. Shirani, L. Wang, and M. Debbabi, SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code, Digital Investigation, vol.12, issue.511, 1346.
DOI : 10.1016/j.diin.2015.01.011

G. Bonfante, M. Kaczmarek, and J. Marion, Architecture of a morphological malware detector, Journal in Computer Virology, vol.0, issue.4, pp.263-270, 2009.
DOI : 10.1007/s11416-008-0102-4

URL : https://hal.archives-ouvertes.fr/inria-00330022

G. Bonfante, J. Marion, F. Sabatier, and A. Thierry, Recognition of binary patterns by morphological analysis, 2012.

G. Bonfante, J. Marion, F. Sabatier, and A. Thierry, Analysis and diversion of Duqu's driver, 2013 8th International Conference on Malicious and Unwanted Software: "The Americas" (MALWARE), 2013.
DOI : 10.1109/MALWARE.2013.6703692

. Kaspersky, comparing-the-regin-module-50251-and-the- qwerty-keylogger

C. Ledoux, A. Lakhotia, C. Miles, V. Notani, and A. Pfeffer, Functracker: Discovering shared code to aid malware forensics, Presented as part of the 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2013.

M. Dalla-preda, R. Giacobazzi, and S. Debray, Unveiling metamorphism by abstract interpretation of code properties, Theoretical Computer Science, vol.577, issue.0, pp.74-97, 2015.
DOI : 10.1016/j.tcs.2015.02.024