An Abstract Theory of Computer Viruses, Advances in Cryptology ? CRYPTO'88, 1988. ,
DOI : 10.1007/0-387-34799-2_28
On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007. ,
DOI : 10.1007/s11416-006-0029-6
URL : https://hal.archives-ouvertes.fr/inria-00338074
Control flow graphs as malware signatures, WTCV, 2007. ,
URL : https://hal.archives-ouvertes.fr/inria-00176235
Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006. ,
DOI : 10.1007/11790754_8
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758
Computational aspects of computer viruses, Computers & Security, vol.8, issue.4, pp.325-344, 1989. ,
DOI : 10.1016/0167-4048(89)90089-8
A Semantics-Based Approach to Malware Detection, POPL'07, 2007. ,
Scanners of the Year 2000: Heuristics, Proceedings of the 5th International Virus Bulletin, 1999. ,
Automatic Extraction of Computer Virus Signatures, 4th Virus Bulletin International Conference, pp.178-184, 1994. ,
Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001. ,
DOI : 10.1109/SECPRI.2001.924286
The Art of Computer Virus Research and Defense, 2005. ,
Neural networks for computer virus recognition . Expert, IEEE [see also IEEE Intelligent Systems and Their Applications, pp.5-6, 1996. ,
DOI : 10.1109/64.511768
URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=294135
Normalizing metamorphic malware using term rewriting. scam, pp.75-84, 2006. ,
DOI : 10.1109/scam.2006.20
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.387.4899