On the (im) possibility of obfuscating programs, Lecture Notes in Computer Science, vol.2139, pp.19-23, 2001. ,
On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007. ,
DOI : 10.1007/s11416-006-0029-6
URL : https://hal.archives-ouvertes.fr/inria-00338074
Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006. ,
DOI : 10.1007/11790754_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758
A taxonomy of obfuscating transformations, 1997. ,
A Semantics- Based Approach to Malware Detection, POPL'07, 2007. ,
DOI : 10.1145/1190215.1190270
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.111.4471
Hunting for metamorphism, Virus Bulletin, 2001. ,
Scanners of the Year 2000: Heuristics, Proceedings of the 5th International Virus Bulletin, 1999. ,
Automatic Extraction of Computer Virus Signatures, 4th Virus Bulletin International Conference, pp.178-184, 1994. ,
Imposing order on program statements to assist anti-virus scanners, 11th Working Conference on Reverse Engineering, 2004. ,
DOI : 10.1109/WCRE.2004.24
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.73.1074
Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001. ,
DOI : 10.1109/SECPRI.2001.924286
Neural networks for computer virus recognition. Expert, IEEE [see also IEEE Intelligent Systems and Their Applications, pp.5-6, 1996. ,
DOI : 10.1109/64.511768
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=294135
Analyzing Memory Accesses in Obfuscated x86 Executables, Conference on Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA), pp.1-18, 2005. ,
DOI : 10.1007/11506881_1
Algebraic Specification of Computer Viruses and Their Environments Selected Papers from the First Conference on Algebra and Coalgebra in Computer Science Young Researchers Workshop, pp.99-113, 2005. ,
Detection of metamorphic computer viruses using algebraic specification, Journal in Computer Virology, vol.1, issue.3, pp.149-161, 2006. ,
DOI : 10.1007/s11416-006-0023-z