B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai et al., On the (im) possibility of obfuscating programs, Lecture Notes in Computer Science, vol.2139, pp.19-23, 2001.

P. Beaucamps and E. Filiol, On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007.
DOI : 10.1007/s11416-006-0029-6

URL : https://hal.archives-ouvertes.fr/inria-00338074

D. Bruschi, L. Martignoni, and M. Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006.
DOI : 10.1007/11790754_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758

C. Collberg, C. Thomborson, and D. Low, A taxonomy of obfuscating transformations, 1997.

M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, A Semantics- Based Approach to Malware Detection, POPL'07, 2007.
DOI : 10.1145/1190215.1190270

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.4471

P. Ferrie and P. Ször, Hunting for metamorphism, Virus Bulletin, 2001.

D. Gryaznov, Scanners of the Year 2000: Heuristics, Proceedings of the 5th International Virus Bulletin, 1999.

J. Kephart and W. Arnold, Automatic Extraction of Computer Virus Signatures, 4th Virus Bulletin International Conference, pp.178-184, 1994.

A. Lakhotia and M. Mohammed, Imposing order on program statements to assist anti-virus scanners, 11th Working Conference on Reverse Engineering, 2004.
DOI : 10.1109/WCRE.2004.24

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.73.1074

M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001.
DOI : 10.1109/SECPRI.2001.924286

G. Tesauro, J. Kephart, and G. Sorkin, Neural networks for computer virus recognition. Expert, IEEE [see also IEEE Intelligent Systems and Their Applications, pp.5-6, 1996.
DOI : 10.1109/64.511768

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=294135

M. Venable, M. Chouchane, M. Karim, and A. Lakhotia, Analyzing Memory Accesses in Obfuscated x86 Executables, Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pp.1-18, 2005.
DOI : 10.1007/11506881_1

M. Webster, Algebraic Specification of Computer Viruses and Their Environments Selected Papers from the First Conference on Algebra and Coalgebra in Computer Science Young Researchers Workshop, pp.99-113, 2005.

M. Webster and G. Malcolm, Detection of metamorphic computer viruses using algebraic specification, Journal in Computer Virology, vol.1, issue.3, pp.149-161, 2006.
DOI : 10.1007/s11416-006-0023-z