P. Arntz, Memory scan, Malwarebytes Unpacked, Official Security Blog, Malwarebytes, 2014.

A. Bianchi, Y. Shoshitaishvili, C. Kruegel, and G. Vigna, Blacksheep, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.341-352, 2012.
DOI : 10.1145/2382196.2382234

M. Christodorescu, S. Jha, S. Seshia, D. Song, and R. Bryant, Semantics-Aware Malware Detection, 2005 IEEE Symposium on Security and Privacy (S&P'05), pp.32-46, 2005.
DOI : 10.1109/SP.2005.20

J. Gionta, A. Azab, W. Enck, P. Ning, and X. Zhang, SEER, Proceedings of the 30th Annual Computer Security Applications Conference on, ACSAC '14, pp.186-195, 2014.
DOI : 10.1145/2664243.2664271

D. Goodin, Antivirus pioneer Symantec declares AV " dead " and " doomed to failure, Ars Technica, 2014.

M. H. Ligh, A. Case, J. Levy, and A. Walters, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory, 2014.

M. Mandiant, Find evil in live memory, Alexandria, Virginia (www.mandiant.com/resources, p.2013

A. Shabtai, R. Moskovitch, Y. Elovici, and C. Glezer, Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey, Information Security Technical Report, vol.14, issue.1, pp.16-29, 2009.
DOI : 10.1016/j.istr.2009.03.003

J. Shewmaker, Analyzing DLL injection, presented at the GSM Conference, 2006.

M. Sikorski and A. Honig, Practical Malware Analysis: The Hands- On Guide to Dissecting Malicious Software, 2012.

V. Virusshare, com ? Because sharing is caring (www. virusshare.com)