H. Agrawal, L. Bahler, J. Micallef, S. Snyder, and A. Virodov, Detection of global, metamorphic malware variants using control and data flow analysis, 31st IEEE Military Communications Conference, MILCOM 2012, pp.1-6, 2012.

M. Alazab, S. Venkatraman, P. Watters, and M. Alazab, Zero-day malware detection based on supervised learning algorithms of api call signatures, Proceedings of the Ninth Australasian Data Mining Conference, vol.121, pp.171-182

. Ausdm-'11, , 2011.

D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu et al., A quantitative study of accuracy in system call-based malware detection, Proceedings of the 2012 International Symposium on Software Testing and Analysis, pp.122-132, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00727280

M. Christodorescu, S. Jha, S. A. Seshia, D. Song, and R. E. Bryant, Semantics-aware malware detection, 2005 IEEE Symposium on Security and Privacy (S P'05), pp.32-46, 2005.

. Cisco, , 2018.

, ClamAV: Clamav 0.99b meets yara! ClamAV blog

C. Collberg, S. Martin, J. Myers, and J. Nagra, Distributed application tamper detection via continuous software updates, Proceedings of the 28th Annual Computer Security Applications Conference, pp.319-328, 2012.

F. Ehsan, Detecting unknown malware: Security analytics & memory forensics, 2015.

P. Godefroid, N. Klarlund, and K. Sen, Dart: Directed automated random testing, Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, pp.213-223, 2005.

R. P. Goldberg, Survey of virtual machine research, Computer, vol.7, issue.6, pp.34-45, 1974.

N. C. Idika and A. P. Mathur, Intel: Intel 64 and ia-32 architectures software developer's manual combined volumes 2a, 2b, 2c, and 2d: Instruction set reference, a-z, pp.325383-067, 2007.

P. Jung, Bypassing sanboxes for fun ! Presentation at hack, 2014.

F. Karbalaie, A. Sami, and M. Ahmadi, Semantic malware detection by deploying graph mining, International Journal of Computer Science Issues (IJCSI), vol.9, issue.1, p.373, 2012.

D. Kirat, G. Vigna, and C. Kruegel, Barecloud: Bare-metal analysis-based evasive malware detection, USENIX Security Symposium, pp.287-301, 2014.

N. Kuzurin, A. V. Shokurov, N. P. Varnovsky, and V. A. Zakharov, On the concept of software obfuscation in computer security, Information Security, 10th International Conference, vol.4779, pp.281-298, 2007.

. Springer, , 2007.

M. H. Ligh, A. Case, J. Levy, and A. Walters, The art of memory forensics: detecting malware and threats in windows, linux, and Mac memory, 2014.

, MissMalware: Tdsanomalpe identifying compile time manipulation in pe headers. Miss Malware blog

A. Moser, C. Kruegel, and E. Kirda, Limits of static analysis for malware detection, Twenty-Third Annual Computer Security Applications Conference, pp.421-430, 2007.

A. Moser, C. Kruegel, and E. Kirda, Limits of static analysis for malware detection, pp.421-430, 2007.

M. Pietrek, Peering inside the pe: A tour of the win32 portable executable file format, Microsoft Developer Network blog, 1994.

M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, A semanticsbased approach to malware detection, SIGPLAN Not, vol.42, issue.1, pp.377-388, 2007.

Y. Project, Yara documentation

M. Schwartz, Oracle virtualbox multiple guest to host escape vulnerabilities, SecuriTeam Secure Disclosure blog, 2018.

K. Sen, D. Marinov, and G. Agha, Cute: A concolic unit testing engine for c, Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp.263-272, 2005.

A. Sharma and S. K. Sahay, Evolution and detection of polymorphic and metamorphic malwares: A survey, International Journal of Computer Applications, vol.90, issue.2, pp.7-11, 2014.

Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino et al., SoK: (State of) The Art of War: Offensive Techniques in Binary Analysis, IEEE Symposium on Security and Privacy, 2016.

M. Sikorski and A. Honig, Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software, 2012.

, throwing a tantrum, part 1: angr internals. Angr blog

P. Szor, The Art of Computer Virus Research and Defense, 2005.

E. Vasilenko and O. Mamedov, To crypt, or to mine that is the question. post on Securelist-Kaspersky Lab's cyberthreat research and reports, 2018.

R. Wojtczuk and J. Rutkowska, Following the White Rabbit: Software attacks against Intel (R) VT-d technology, 2011.

B. Yadegari and S. Debray, Symbolic execution of obfuscated code, Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp.732-744, 2015.