R. Rubira-branco, G. N. Barbosa, and P. D. Neto, Scientific but Not Academical Overview of Malware Anti-Debugging, Anti- Disassembly and Anti-VM, 2012.

P. Chen, L. Desmet, and C. Huygens, A Study on Advanced Persistent Threats, Proceedings of the 15th IFIP TC6/TC11 Conference on Communications and Multimedia Security, 2014.
DOI : 10.1007/978-3-662-44885-4_5

URL : https://hal.archives-ouvertes.fr/hal-01404186

X. Chen, Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware, IEEE International Conference on Dependable Systems and Networks, pp.177-186, 2008.

P. Ferrie, The Ultimate Anti-Debugging Reference, 2011.

P. Giura and W. Wang, Using large scale distributed computing to unveil advanced persistent threats, SCIENCE, vol.1, issue.3, p.2013

E. M. Hutchins, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Proceedings of the 6th International Conference on Information Warfare and Security, 2013.

. Kaspersky, The Icefog APT: A Tale of Cloak and Three Daggers, 2013.

. Kaspersky, Energetic Bear -Crouching Yeti, 2014.

A. Stevens-le-blond, C. Uritesc, Z. Gilbert, P. Leong-chua, E. Saxena et al., A look at targeted attacks through the lense of an ngo, Proceedings of the 23rd USENIX conference on Security Symposium, pp.543-558, 2014.

. Mandiant, APT1: Exposing One of China's Cyber Espionage Unit, 2013.

D. Mohanty, Anti-Virus Evasion Techniques Virus Evasion Techniques Virus Evasion Techniques and Countermeasures

N. Rin, Virtual Machines Detection Enhanced, 2013.

A. Singh and Z. Bu, Hot Knives Through Butter: Evading File-based Sandboxes, 2014.

O. Thonnard, Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat, Proceedings of the 15th Symposium on Research in Attacks, Intrusions, and Defenses, pp.64-85, 2012.
DOI : 10.1007/978-3-642-33338-5_4

N. Villeneuve, Operation Ke3chang: Targeted Attacks Against Ministries of Foreign Affairs, 2013.