L. Adleman, An Abstract Theory of Computer Viruses, Advances in Cryptology ? CRYPTO'88, 1988.
DOI : 10.1007/0-387-34799-2_28

P. Beaucamps and E. Filiol, On the possibility of practically obfuscating programs towards a unified perspective of code protection, Journal in Computer Virology, vol.51, issue.8, pp.3-21, 2007.
DOI : 10.1007/s11416-006-0029-6

URL : https://hal.archives-ouvertes.fr/inria-00338074

G. Bonfante, M. Kaczmarek, and J. Marion, Control flow graphs as malware signatures, WTCV, 2007.
URL : https://hal.archives-ouvertes.fr/inria-00176235

D. Bruschi, L. Martignoni, and M. Monga, Detecting Self-mutating Malware Using Control-Flow Graph Matching, 2006.
DOI : 10.1007/11790754_8

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.7758

F. Cohen, Computational aspects of computer viruses, Computers & Security, vol.8, issue.4, pp.325-344, 1989.
DOI : 10.1016/0167-4048(89)90089-8

M. D. Preda, M. Christodorescu, S. Jha, and S. Debray, A Semantics-Based Approach to Malware Detection, POPL'07, 2007.

D. Gryaznov, Scanners of the Year 2000: Heuristics, Proceedings of the 5th International Virus Bulletin, 1999.

J. Kephart and W. Arnold, Automatic Extraction of Computer Virus Signatures, 4th Virus Bulletin International Conference, pp.178-184, 1994.

M. Schultz, E. Eskin, E. Zadok, and S. Stolfo, Data mining methods for detection of new malicious executables, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, p.38, 2001.
DOI : 10.1109/SECPRI.2001.924286

P. Ször, The Art of Computer Virus Research and Defense, 2005.

G. Tesauro, J. Kephart, and G. Sorkin, Neural networks for computer virus recognition . Expert, IEEE [see also IEEE Intelligent Systems and Their Applications, pp.5-6, 1996.
DOI : 10.1109/64.511768

URL : http://ieeexplore.ieee.org:80/stamp/stamp.jsp?tp=&arnumber=294135

A. Walenstein, R. Mathur, M. R. Chouchane, and A. Lakhotia, Normalizing metamorphic malware using term rewriting. scam, pp.75-84, 2006.
DOI : 10.1109/scam.2006.20

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.387.4899