B. Blunden, The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2009.

J. Devesa, I. Santos, X. Cantero, Y. K. Penya, and P. G. Bringas, Automatic behaviour-based analysis and classification system for malware detection, ICEIS 2010 -Proceedings of the 12th International Conference on Enterprise Information Systems, pp.395-399, 2010.

A. A. Elhadi, M. A. Maarof, and B. I. Barry, Improving the Detection of Malware Behaviour Using Simplified Data Dependent API Call Graph, International Journal of Security and Its Applications, vol.7, issue.5, pp.29-42, 2013.
DOI : 10.14257/ijsia.2013.7.5.03

K. K. Ispoglou and M. Payer, malwash: Washing malware to evade dynamic analysis, Proceedings of the 10th USENIX Conference on Offensive Technologies. pp. 106?117. WOOT'16, USENIX Association, 2016.

Y. Ji, Y. He, X. Jiang, J. Cao, and Q. Li, Combating the evasion mechanisms of social bots, Computers & Security, vol.58, pp.230-249, 2016.
DOI : 10.1016/j.cose.2016.01.007

Y. Ji, Y. He, D. Zhu, Q. Li, and D. Guo, A Mulitiprocess Mechanism of Evading Behavior-Based Bot Detection Approaches, Proceedings of the 10th International Conference on Information Security Practice and Experience, pp.75-89, 2014.
DOI : 10.1007/978-3-319-06320-1_7

C. Kolbitsch, P. M. Comparetti, C. Kruegel, E. Kirda, X. Zhou et al., Effective and efficient malware detection at the end host, Proceedings of the 18th Conference on USENIX Security Symposium SSYM'09, USENIX Association, pp.351-366, 2009.

W. Ma, P. Duan, S. Liu, G. Gu, and J. C. Liu, Shadow attacks: automatically evading system-call-behavior based malware detection, Journal in Computer Virology, vol.4, issue.1, pp.1-13, 2012.
DOI : 10.1007/s11416-008-0084-2

URL : http://faculty.cse.tamu.edu/guofei/paper/ShadowAttacks_final-onecolumn.pdf

S. Laxmi, V. Rajarajan, M. Gaur, M. S. Conti, and M. , Employing program semantics for malware detection, MSDN: File system minifilter drivers, pp.2591-2604, 2015.

M. Ramilli and M. Bishop, Multi-stage delivery of malware, 2010 5th International Conference on Malicious and Unwanted Software, pp.91-97, 2010.
DOI : 10.1109/MALWARE.2010.5665788

URL : http://nob.cs.ucdavis.edu/%7Ebishop/papers/2010-malware/msmalware.pdf

M. Ramilli, M. Bishop, and S. Sun, Multiprocess malware, 2011 6th International Conference on Malicious and Unwanted Software, 2011.
DOI : 10.1109/MALWARE.2011.6112320