H. Mohammed, . Almeshekah, H. Eugene, and . Spafford, Planning and integrating deception into computer security defenses, Proceedings of the 2014 workshop on New Security Paradigms Workshop, pp.127-138, 2014.

F. Araujo, K. W. Hamlen, S. Biedermann, and S. Katzenbeisser, From Patches to Honey-Patches, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.942-953, 2014.
DOI : 10.1007/978-3-642-22424-9_3

F. Araujo, M. Shapouri, S. Pandey, and K. Hamlen, Experiences with honey-patching in active cyber security education, 8th Workshop on Cyber Security Experimentation and Test (CSET 15), 2015.

A. Mohd, G. Bashar, . Krishnan, G. Markus, . Kuhn et al., Low-threat security patches and tools, International Conference on Software Maintenance, pp.306-313, 1997.

M. Brian, S. Bowen, . Hershkop, D. Angelos, S. J. Keromytis et al., Baiting inside attackers using decoy documents, 2009.

D. Brumley, P. Poosankam, D. Song, and J. Zheng, Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications, 2008 IEEE Symposium on Security and Privacy (sp 2008), pp.143-157, 2008.
DOI : 10.1109/SP.2008.17

URL : http://www.cs.cmu.edu/~dbrumley/pubs/apeg.pdf

C. Cadar, D. Dunbar, R. Dawson, and . Engler, Unassisted and automatic generation of high-coverage tests for complex systems programs, OSDI, pp.209-224, 2008.

C. Collberg and J. Nagra, Surreptitious software. Upper Saddle River, 2010.

S. Christian, C. Collberg, and . Thomborson, Watermarking, tamper-proofing, and obfuscation-tools for software protection, IEEE Transactions on software engineering, vol.28, issue.8, pp.735-746, 2002.

B. Coppens, B. D. Sutter, and K. De-bosschere, Protecting Your Software Updates, IEEE Security & Privacy, vol.11, issue.2, pp.47-54, 2013.
DOI : 10.1109/MSP.2012.113

URL : http://users.elis.ugent.be/~brdsutte/research/publications/2013IEEESPcoppens.pdf

S. Crane, P. Larsen, S. Brunthaler, and M. Franz, Booby trapping software, Proceedings of the 2013 workshop on New security paradigms workshop, NSPW '13, pp.95-106, 2013.
DOI : 10.1145/2535813.2535824

URL : http://www.nspw.org/papers/2013/nspw2013-crane.pdf

A. K. Dewdey, Computer Recreations, A Core War Bestiary of Virus, Worms and other Threats to Computer Memories, Scientific America, vol.252, 1985.

S. Dolan, mov is turing-complete, pp.153-2013

Y. Kanzaki, A. Monden, and C. Collberg, Code Artificiality: A Metric for the Code Stealth Based on an N-Gram Model, 2015 IEEE/ACM 1st International Workshop on Software Protection, pp.31-37, 2015.
DOI : 10.1109/SPRO.2015.14

C. Lattner, The LLVM Compiler Infrastructure, 2017.
DOI : 10.1007/11532378_2

D. Kevin, . Mitnick, L. William, and . Simon, The art of deception: Controlling the human element of security, 2011.

A. Moser, C. Kruegel, and E. Kirda, Limits of Static Analysis for Malware Detection, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007), pp.421-430, 2007.
DOI : 10.1109/ACSAC.2007.21

J. Oh, Fight against 1-day exploits: Diffing binaries vs anti-diffing binaries . Black Hat, 2009.

S. Malek-ben and S. J. Stolfo, Decoy document deployment for effective masquerade attack detection, Detection of Intrusions and Malware, and Vulnerability Assessment, pp.35-54, 2011.

E. Spafford, More than passive defense, CERIAS, 2011.

. Symantec, Internet security threat report

K. Sharath, . Udupa, K. Saumya, M. Debray, and . Madou, Deobfuscation: Reverse engineering obfuscated code, Reverse Engineering, 12th Working Conference on, p.10, 2005.

C. Wang and S. Suo, The practical defending of malicious reverse engineering, 2015.

B. Whaley, Toward a general theory of deception, Journal of Strategic Studies, vol.19, issue.1, pp.178-192, 1982.
DOI : 10.1037/0003-066X.33.10.869

A. Yokoyama, K. Ishii, R. Tanabe, Y. Papa, K. Yoshioka et al., SandPrint: Fingerprinting Malware Sandboxes to Provide Intelligence for Sandbox Evasion, International Symposium on Research in Attacks, Intrusions, and Defenses, pp.165-187, 2016.
DOI : 10.1145/2590296.2590325

J. Yuill, Defensive computer-security deception operations: processes, principles and techniques, 2006.

J. Yuill, M. Zappe, D. Denning, and F. Feer, Honeyfiles: deceptive files for intrusion detection, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004., pp.116-122, 2004.
DOI : 10.1109/IAW.2004.1437806